Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/87131?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/87131?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-305.186.1?arch=el8_4", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "4.18.0-305.186.1", "qualifiers": { "arch": "el8_4" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64724?format=api", "vulnerability_id": "VCID-64kf-nxzw-vubp", "summary": "kernel: Linux kernel: Use-after-free in teql queueing discipline can lead to privilege escalation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23074.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23074.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-23074", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03352", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03364", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03379", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03383", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03404", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03362", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03333", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04719", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04757", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04505", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04476", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04485", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04622", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04665", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04699", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04723", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-23074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436791", "reference_id": "2436791", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3083", "reference_id": "RHSA-2026:3083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3110", "reference_id": "RHSA-2026:3110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3268", "reference_id": "RHSA-2026:3268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3277", "reference_id": "RHSA-2026:3277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3388", "reference_id": "RHSA-2026:3388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3634", "reference_id": "RHSA-2026:3634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3685", "reference_id": "RHSA-2026:3685", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3685" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3810", "reference_id": "RHSA-2026:3810", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3810" }, { "reference_url": "https://usn.ubuntu.com/8142-1/", "reference_id": "USN-8142-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8142-1/" }, { "reference_url": "https://usn.ubuntu.com/8143-1/", "reference_id": "USN-8143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8143-1/" }, { "reference_url": "https://usn.ubuntu.com/8143-2/", "reference_id": "USN-8143-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8143-2/" }, { "reference_url": "https://usn.ubuntu.com/8145-1/", "reference_id": "USN-8145-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8145-1/" }, { "reference_url": "https://usn.ubuntu.com/8145-2/", "reference_id": "USN-8145-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8145-2/" }, { "reference_url": "https://usn.ubuntu.com/8145-3/", "reference_id": "USN-8145-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8145-3/" }, { "reference_url": "https://usn.ubuntu.com/8145-4/", "reference_id": "USN-8145-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8145-4/" }, { "reference_url": "https://usn.ubuntu.com/8145-5/", "reference_id": "USN-8145-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8145-5/" }, { "reference_url": "https://usn.ubuntu.com/8148-1/", "reference_id": "USN-8148-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8148-1/" }, { "reference_url": "https://usn.ubuntu.com/8148-2/", "reference_id": "USN-8148-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8148-2/" }, { "reference_url": "https://usn.ubuntu.com/8148-3/", "reference_id": "USN-8148-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8148-3/" }, { "reference_url": "https://usn.ubuntu.com/8148-4/", "reference_id": "USN-8148-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8148-4/" }, { "reference_url": "https://usn.ubuntu.com/8148-5/", "reference_id": "USN-8148-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8148-5/" }, { "reference_url": "https://usn.ubuntu.com/8148-6/", "reference_id": "USN-8148-6", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8148-6/" }, { "reference_url": "https://usn.ubuntu.com/8148-7/", "reference_id": "USN-8148-7", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8148-7/" }, { "reference_url": "https://usn.ubuntu.com/8149-1/", "reference_id": "USN-8149-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8149-1/" }, { "reference_url": "https://usn.ubuntu.com/8149-2/", "reference_id": "USN-8149-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8149-2/" }, { "reference_url": "https://usn.ubuntu.com/8149-3/", "reference_id": "USN-8149-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8149-3/" }, { "reference_url": "https://usn.ubuntu.com/8152-1/", "reference_id": "USN-8152-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8152-1/" }, { "reference_url": "https://usn.ubuntu.com/8159-1/", "reference_id": "USN-8159-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8159-1/" }, { "reference_url": "https://usn.ubuntu.com/8159-2/", "reference_id": "USN-8159-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8159-2/" }, { "reference_url": "https://usn.ubuntu.com/8159-3/", "reference_id": "USN-8159-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8159-3/" }, { "reference_url": "https://usn.ubuntu.com/8162-1/", "reference_id": "USN-8162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8162-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-1/", "reference_id": "USN-8163-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-2/", "reference_id": "USN-8163-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-2/" }, { "reference_url": "https://usn.ubuntu.com/8164-1/", "reference_id": "USN-8164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8164-1/" }, { "reference_url": "https://usn.ubuntu.com/8165-1/", "reference_id": "USN-8165-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8165-1/" }, { "reference_url": "https://usn.ubuntu.com/8188-1/", "reference_id": "USN-8188-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8188-1/" }, { "reference_url": "https://usn.ubuntu.com/8200-1/", "reference_id": "USN-8200-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8200-1/" }, { "reference_url": "https://usn.ubuntu.com/8200-2/", "reference_id": "USN-8200-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8200-2/" }, { "reference_url": "https://usn.ubuntu.com/8201-1/", "reference_id": "USN-8201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8201-1/" }, { "reference_url": "https://usn.ubuntu.com/8203-1/", "reference_id": "USN-8203-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8203-1/" }, { "reference_url": "https://usn.ubuntu.com/8224-1/", "reference_id": "USN-8224-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8224-1/" }, { "reference_url": "https://usn.ubuntu.com/8243-1/", "reference_id": "USN-8243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8243-1/" }, { "reference_url": "https://usn.ubuntu.com/8261-1/", "reference_id": "USN-8261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8261-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2026-23074" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-64kf-nxzw-vubp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67148?format=api", "vulnerability_id": "VCID-676c-3wrp-1ufr", "summary": "kernel: RDMA/rxe: Fix incomplete state save in rxe_requester", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53539.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53539.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53539", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03188", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03198", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03201", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03205", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03231", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03185", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03158", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03142", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03123", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03242", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03243", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03238", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03116", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0361", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04438", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04465", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53539" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401510", "reference_id": "2401510", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401510" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22800", "reference_id": "RHSA-2025:22800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22801", "reference_id": "RHSA-2025:22801", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22801" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0534", "reference_id": "RHSA-2026:0534", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0534" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0535", "reference_id": "RHSA-2026:0535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10756", "reference_id": "RHSA-2026:10756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1445", "reference_id": "RHSA-2026:1445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1494", "reference_id": "RHSA-2026:1494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1495", "reference_id": "RHSA-2026:1495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2664", "reference_id": "RHSA-2026:2664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5691", "reference_id": "RHSA-2026:5691", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5691" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9870", "reference_id": "RHSA-2026:9870", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9870" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53539" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-676c-3wrp-1ufr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66268?format=api", "vulnerability_id": "VCID-6wu1-5wuf-nyan", "summary": "kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40322.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40322.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40322", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10636", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10643", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10705", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10564", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12894", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1365", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13621", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13585", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13537", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13451", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13446", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1352", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13528", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13501", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13393", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13296", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40322" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419902", "reference_id": "2419902", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419902" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1661", "reference_id": "RHSA-2026:1661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1662", "reference_id": "RHSA-2026:1662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1727", "reference_id": "RHSA-2026:1727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2282", "reference_id": "RHSA-2026:2282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2352", "reference_id": "RHSA-2026:2352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2490", "reference_id": "RHSA-2026:2490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2535", "reference_id": "RHSA-2026:2535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2560", "reference_id": "RHSA-2026:2560", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2560" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2573", "reference_id": "RHSA-2026:2573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2577", "reference_id": "RHSA-2026:2577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2583", "reference_id": "RHSA-2026:2583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2594", "reference_id": "RHSA-2026:2594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2664", "reference_id": "RHSA-2026:2664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2722", "reference_id": "RHSA-2026:2722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://usn.ubuntu.com/8029-1/", "reference_id": "USN-8029-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8029-1/" }, { "reference_url": "https://usn.ubuntu.com/8029-2/", "reference_id": "USN-8029-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8029-2/" }, { "reference_url": "https://usn.ubuntu.com/8029-3/", "reference_id": "USN-8029-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8029-3/" }, { "reference_url": "https://usn.ubuntu.com/8030-1/", "reference_id": "USN-8030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8030-1/" }, { "reference_url": "https://usn.ubuntu.com/8048-1/", "reference_id": "USN-8048-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8048-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-1/", "reference_id": "USN-8095-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-2/", "reference_id": "USN-8095-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-2/" }, { "reference_url": "https://usn.ubuntu.com/8095-3/", "reference_id": "USN-8095-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-3/" }, { "reference_url": "https://usn.ubuntu.com/8095-4/", "reference_id": "USN-8095-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-4/" }, { "reference_url": "https://usn.ubuntu.com/8095-5/", "reference_id": "USN-8095-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-5/" }, { "reference_url": "https://usn.ubuntu.com/8096-1/", "reference_id": "USN-8096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-1/" }, { "reference_url": "https://usn.ubuntu.com/8096-2/", "reference_id": "USN-8096-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-2/" }, { "reference_url": "https://usn.ubuntu.com/8096-3/", "reference_id": "USN-8096-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-3/" }, { "reference_url": "https://usn.ubuntu.com/8096-4/", "reference_id": "USN-8096-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-4/" }, { "reference_url": "https://usn.ubuntu.com/8096-5/", "reference_id": "USN-8096-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-5/" }, { "reference_url": "https://usn.ubuntu.com/8100-1/", "reference_id": "USN-8100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8100-1/" }, { "reference_url": "https://usn.ubuntu.com/8116-1/", "reference_id": "USN-8116-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8116-1/" }, { "reference_url": "https://usn.ubuntu.com/8125-1/", "reference_id": "USN-8125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8125-1/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" }, { "reference_url": "https://usn.ubuntu.com/8141-1/", "reference_id": "USN-8141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8141-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-1/", "reference_id": "USN-8163-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-2/", "reference_id": "USN-8163-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-2/" }, { "reference_url": "https://usn.ubuntu.com/8165-1/", "reference_id": "USN-8165-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8165-1/" }, { "reference_url": "https://usn.ubuntu.com/8243-1/", "reference_id": "USN-8243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8243-1/" }, { "reference_url": "https://usn.ubuntu.com/8261-1/", "reference_id": "USN-8261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8261-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-40322" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6wu1-5wuf-nyan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66172?format=api", "vulnerability_id": "VCID-7qtt-szq5-huep", "summary": "kernel: ext4: fix use-after-free in ext4_orphan_cleanup", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50673.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50673.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50673", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08616", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10975", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.108", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10876", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10929", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14588", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14549", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14491", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14383", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14384", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14454", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14487", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14484", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14429", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14308", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50673" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420347", "reference_id": "2420347", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420347" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2264", "reference_id": "RHSA-2026:2264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2264" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2378", "reference_id": "RHSA-2026:2378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2490", "reference_id": "RHSA-2026:2490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2573", "reference_id": "RHSA-2026:2573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2577", "reference_id": "RHSA-2026:2577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2664", "reference_id": "RHSA-2026:2664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3267", "reference_id": "RHSA-2026:3267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3277", "reference_id": "RHSA-2026:3277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3358", "reference_id": "RHSA-2026:3358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3358" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3634", "reference_id": "RHSA-2026:3634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3685", "reference_id": "RHSA-2026:3685", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3685" } ], "fixed_packages": [], "aliases": [ "CVE-2022-50673" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7qtt-szq5-huep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66200?format=api", "vulnerability_id": "VCID-aw1b-z3v7-u3fj", "summary": "kernel: Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp}", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53827.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53827.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08811", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10975", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.108", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10876", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10929", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14588", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14549", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14491", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14383", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14384", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14454", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14487", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14484", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14429", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14308", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53827" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420376", "reference_id": "2420376", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3388", "reference_id": "RHSA-2026:3388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3388" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53827" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aw1b-z3v7-u3fj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67091?format=api", "vulnerability_id": "VCID-c49r-knse-6bc5", "summary": "kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39933.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39933.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-39933", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04764", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04779", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04812", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04825", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0479", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0477", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04912", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04951", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04957", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04723", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04731", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04875", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05471", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05517", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-39933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39933" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401432", "reference_id": "2401432", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0759", "reference_id": "RHSA-2026:0759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0760", "reference_id": "RHSA-2026:0760", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0760" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0793", "reference_id": "RHSA-2026:0793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1727", "reference_id": "RHSA-2026:1727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2282", "reference_id": "RHSA-2026:2282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2759", "reference_id": "RHSA-2026:2759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2766", "reference_id": "RHSA-2026:2766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3267", "reference_id": "RHSA-2026:3267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3268", "reference_id": "RHSA-2026:3268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3277", "reference_id": "RHSA-2026:3277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3293", "reference_id": "RHSA-2026:3293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3358", "reference_id": "RHSA-2026:3358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3358" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3375", "reference_id": "RHSA-2026:3375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3375" } ], "fixed_packages": [], "aliases": [ "CVE-2025-39933" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c49r-knse-6bc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66946?format=api", "vulnerability_id": "VCID-dcwa-n32k-73cm", "summary": "kernel: Bluetooth: hci_event: call disconnect callback before deleting conn", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53673.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53673.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53673", "reference_id": "", "reference_type": "", "scores": [ { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00517", "published_at": "2026-04-02T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.0051", "published_at": "2026-04-04T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00507", "published_at": "2026-04-07T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00505", "published_at": "2026-04-08T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00503", "published_at": "2026-04-13T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00504", "published_at": "2026-04-18T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00535", "published_at": "2026-04-21T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00531", "published_at": "2026-04-24T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00533", "published_at": "2026-04-29T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00501", "published_at": "2026-04-12T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.005", "published_at": "2026-04-16T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00729", "published_at": "2026-05-07T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00736", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53673" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402193", "reference_id": "2402193", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1142", "reference_id": "RHSA-2026:1142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1148", "reference_id": "RHSA-2026:1148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2490", "reference_id": "RHSA-2026:2490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2535", "reference_id": "RHSA-2026:2535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2560", "reference_id": "RHSA-2026:2560", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2560" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2573", "reference_id": "RHSA-2026:2573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2577", "reference_id": "RHSA-2026:2577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2583", "reference_id": "RHSA-2026:2583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53673" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcwa-n32k-73cm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66245?format=api", "vulnerability_id": "VCID-gg4r-7tb8-rkha", "summary": "kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40304.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40304.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40304", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12569", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16694", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16546", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16631", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21111", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21121", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21077", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21025", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21015", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21004", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20877", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20879", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20847", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20741", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40304" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419870", "reference_id": "2419870", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419870" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1727", "reference_id": "RHSA-2026:1727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2282", "reference_id": "RHSA-2026:2282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2490", "reference_id": "RHSA-2026:2490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2535", "reference_id": "RHSA-2026:2535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2560", "reference_id": "RHSA-2026:2560", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2560" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2573", "reference_id": "RHSA-2026:2573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2577", "reference_id": "RHSA-2026:2577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2583", "reference_id": "RHSA-2026:2583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2664", "reference_id": "RHSA-2026:2664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2720", "reference_id": "RHSA-2026:2720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2722", "reference_id": "RHSA-2026:2722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2759", "reference_id": "RHSA-2026:2759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2766", "reference_id": "RHSA-2026:2766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2821", "reference_id": "RHSA-2026:2821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://usn.ubuntu.com/8029-1/", "reference_id": "USN-8029-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8029-1/" }, { "reference_url": "https://usn.ubuntu.com/8029-2/", "reference_id": "USN-8029-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8029-2/" }, { "reference_url": "https://usn.ubuntu.com/8029-3/", "reference_id": "USN-8029-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8029-3/" }, { "reference_url": "https://usn.ubuntu.com/8030-1/", "reference_id": "USN-8030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8030-1/" }, { "reference_url": "https://usn.ubuntu.com/8048-1/", "reference_id": "USN-8048-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8048-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-1/", "reference_id": "USN-8095-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-2/", "reference_id": "USN-8095-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-2/" }, { "reference_url": "https://usn.ubuntu.com/8095-3/", "reference_id": "USN-8095-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-3/" }, { "reference_url": "https://usn.ubuntu.com/8095-4/", "reference_id": "USN-8095-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-4/" }, { "reference_url": "https://usn.ubuntu.com/8095-5/", "reference_id": "USN-8095-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-5/" }, { "reference_url": "https://usn.ubuntu.com/8096-1/", "reference_id": "USN-8096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-1/" }, { "reference_url": "https://usn.ubuntu.com/8096-2/", "reference_id": "USN-8096-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-2/" }, { "reference_url": "https://usn.ubuntu.com/8096-3/", "reference_id": "USN-8096-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-3/" }, { "reference_url": "https://usn.ubuntu.com/8096-4/", "reference_id": "USN-8096-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-4/" }, { "reference_url": "https://usn.ubuntu.com/8096-5/", "reference_id": "USN-8096-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-5/" }, { "reference_url": "https://usn.ubuntu.com/8100-1/", "reference_id": "USN-8100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8100-1/" }, { "reference_url": "https://usn.ubuntu.com/8116-1/", "reference_id": "USN-8116-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8116-1/" }, { "reference_url": "https://usn.ubuntu.com/8125-1/", "reference_id": "USN-8125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8125-1/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" }, { "reference_url": "https://usn.ubuntu.com/8141-1/", "reference_id": "USN-8141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8141-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-1/", "reference_id": "USN-8163-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-2/", "reference_id": "USN-8163-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-2/" }, { "reference_url": "https://usn.ubuntu.com/8165-1/", "reference_id": "USN-8165-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8165-1/" }, { "reference_url": "https://usn.ubuntu.com/8243-1/", "reference_id": "USN-8243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8243-1/" }, { "reference_url": "https://usn.ubuntu.com/8261-1/", "reference_id": "USN-8261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8261-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-40304" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gg4r-7tb8-rkha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66191?format=api", "vulnerability_id": "VCID-h6rc-a42b-4yhq", "summary": "kernel: drm/i915: Fix NULL ptr deref by checking new_crtc_state", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53833.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53833.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53833", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05921", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06793", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0684", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06822", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06874", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06907", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09303", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09273", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09259", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09152", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09144", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09299", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09349", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09275", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0919", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53833" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420366", "reference_id": "2420366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2490", "reference_id": "RHSA-2026:2490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2535", "reference_id": "RHSA-2026:2535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2560", "reference_id": "RHSA-2026:2560", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2560" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2573", "reference_id": "RHSA-2026:2573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2577", "reference_id": "RHSA-2026:2577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2583", "reference_id": "RHSA-2026:2583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2664", "reference_id": "RHSA-2026:2664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53833" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h6rc-a42b-4yhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66155?format=api", "vulnerability_id": "VCID-hvwv-k9qk-gfar", "summary": "kernel: ip6_vti: fix slab-use-after-free in decode_session6", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53821.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53821.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53821", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08811", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10975", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.108", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10876", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10929", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14588", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14549", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14491", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14383", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14384", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14454", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14487", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14484", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14429", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14308", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53821" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53821" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420329", "reference_id": "2420329", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138", "reference_id": "RHSA-2024:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3267", "reference_id": "RHSA-2026:3267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3268", "reference_id": "RHSA-2026:3268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3277", "reference_id": "RHSA-2026:3277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3293", "reference_id": "RHSA-2026:3293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3358", "reference_id": "RHSA-2026:3358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3358" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3375", "reference_id": "RHSA-2026:3375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3388", "reference_id": "RHSA-2026:3388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3388" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53821" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hvwv-k9qk-gfar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66303?format=api", "vulnerability_id": "VCID-je4j-ksj2-hqb3", "summary": "kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40271.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40271.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40271", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16694", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21111", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21121", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21077", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21025", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20969", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.2105", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20877", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20879", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20847", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21015", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21004", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04037", "scoring_system": "epss", "scoring_elements": "0.88539", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04037", "scoring_system": "epss", "scoring_elements": "0.88555", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40271" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419837", "reference_id": "2419837", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419837" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52550.c", "reference_id": "CVE-2025-40271", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52550.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1661", "reference_id": "RHSA-2026:1661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1662", "reference_id": "RHSA-2026:1662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1690", "reference_id": "RHSA-2026:1690", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2212", "reference_id": "RHSA-2026:2212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2212" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2759", "reference_id": "RHSA-2026:2759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2761", "reference_id": "RHSA-2026:2761", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2761" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2766", "reference_id": "RHSA-2026:2766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3267", "reference_id": "RHSA-2026:3267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3268", "reference_id": "RHSA-2026:3268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3277", "reference_id": "RHSA-2026:3277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3293", "reference_id": "RHSA-2026:3293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3358", "reference_id": "RHSA-2026:3358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3358" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3375", "reference_id": "RHSA-2026:3375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3388", "reference_id": "RHSA-2026:3388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3634", "reference_id": "RHSA-2026:3634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3685", "reference_id": "RHSA-2026:3685", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3685" }, { "reference_url": "https://usn.ubuntu.com/8029-1/", "reference_id": "USN-8029-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8029-1/" }, { "reference_url": "https://usn.ubuntu.com/8029-2/", "reference_id": "USN-8029-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8029-2/" }, { "reference_url": "https://usn.ubuntu.com/8029-3/", "reference_id": "USN-8029-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8029-3/" }, { "reference_url": "https://usn.ubuntu.com/8030-1/", "reference_id": "USN-8030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8030-1/" }, { "reference_url": "https://usn.ubuntu.com/8048-1/", "reference_id": "USN-8048-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8048-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-1/", "reference_id": "USN-8095-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-2/", "reference_id": "USN-8095-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-2/" }, { "reference_url": "https://usn.ubuntu.com/8095-3/", "reference_id": "USN-8095-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-3/" }, { "reference_url": "https://usn.ubuntu.com/8095-4/", "reference_id": "USN-8095-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-4/" }, { "reference_url": "https://usn.ubuntu.com/8095-5/", "reference_id": "USN-8095-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-5/" }, { "reference_url": "https://usn.ubuntu.com/8096-1/", "reference_id": "USN-8096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-1/" }, { "reference_url": "https://usn.ubuntu.com/8096-2/", "reference_id": "USN-8096-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-2/" }, { "reference_url": "https://usn.ubuntu.com/8096-3/", "reference_id": "USN-8096-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-3/" }, { "reference_url": "https://usn.ubuntu.com/8096-4/", "reference_id": "USN-8096-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-4/" }, { "reference_url": "https://usn.ubuntu.com/8096-5/", "reference_id": "USN-8096-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-5/" }, { "reference_url": "https://usn.ubuntu.com/8100-1/", "reference_id": "USN-8100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8100-1/" }, { "reference_url": "https://usn.ubuntu.com/8116-1/", "reference_id": "USN-8116-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8116-1/" }, { "reference_url": "https://usn.ubuntu.com/8125-1/", "reference_id": "USN-8125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8125-1/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" }, { "reference_url": "https://usn.ubuntu.com/8141-1/", "reference_id": "USN-8141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8141-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-1/", "reference_id": "USN-8163-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-2/", "reference_id": "USN-8163-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-2/" }, { "reference_url": "https://usn.ubuntu.com/8165-1/", "reference_id": "USN-8165-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8165-1/" }, { "reference_url": "https://usn.ubuntu.com/8243-1/", "reference_id": "USN-8243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8243-1/" }, { "reference_url": "https://usn.ubuntu.com/8261-1/", "reference_id": "USN-8261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8261-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-40271" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-je4j-ksj2-hqb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68580?format=api", "vulnerability_id": "VCID-mu97-p4wb-5qck", "summary": "kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38459.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38459.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-38459", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03447", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03394", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03407", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03423", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03426", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05048", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05083", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05066", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04991", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04997", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05914", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05846", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05878", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.06031", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05924", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0594", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-38459" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38459", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38459" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2383487", "reference_id": "2383487", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2383487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1661", "reference_id": "RHSA-2026:1661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1662", "reference_id": "RHSA-2026:1662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2212", "reference_id": "RHSA-2026:2212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2212" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3268", "reference_id": "RHSA-2026:3268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3277", "reference_id": "RHSA-2026:3277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3388", "reference_id": "RHSA-2026:3388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3634", "reference_id": "RHSA-2026:3634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3685", "reference_id": "RHSA-2026:3685", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3685" }, { "reference_url": "https://usn.ubuntu.com/7774-1/", "reference_id": "USN-7774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7774-1/" }, { "reference_url": "https://usn.ubuntu.com/7774-2/", "reference_id": "USN-7774-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7774-2/" }, { "reference_url": "https://usn.ubuntu.com/7774-3/", "reference_id": "USN-7774-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7774-3/" }, { "reference_url": "https://usn.ubuntu.com/7774-4/", "reference_id": "USN-7774-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7774-4/" }, { "reference_url": "https://usn.ubuntu.com/7774-5/", "reference_id": "USN-7774-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7774-5/" }, { "reference_url": "https://usn.ubuntu.com/7775-1/", "reference_id": "USN-7775-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7775-1/" }, { "reference_url": "https://usn.ubuntu.com/7775-2/", "reference_id": "USN-7775-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7775-2/" }, { "reference_url": "https://usn.ubuntu.com/7775-3/", "reference_id": "USN-7775-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7775-3/" }, { "reference_url": "https://usn.ubuntu.com/7776-1/", "reference_id": "USN-7776-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7776-1/" }, { "reference_url": "https://usn.ubuntu.com/7879-1/", "reference_id": "USN-7879-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7879-1/" }, { "reference_url": "https://usn.ubuntu.com/7879-2/", "reference_id": "USN-7879-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7879-2/" }, { "reference_url": "https://usn.ubuntu.com/7879-3/", "reference_id": "USN-7879-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7879-3/" }, { "reference_url": "https://usn.ubuntu.com/7879-4/", "reference_id": "USN-7879-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7879-4/" }, { "reference_url": "https://usn.ubuntu.com/7880-1/", "reference_id": "USN-7880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7880-1/" }, { "reference_url": "https://usn.ubuntu.com/7934-1/", "reference_id": "USN-7934-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7934-1/" }, { "reference_url": "https://usn.ubuntu.com/8028-1/", "reference_id": "USN-8028-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-1/" }, { "reference_url": "https://usn.ubuntu.com/8028-2/", "reference_id": "USN-8028-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-2/" }, { "reference_url": "https://usn.ubuntu.com/8028-3/", "reference_id": "USN-8028-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-3/" }, { "reference_url": "https://usn.ubuntu.com/8028-4/", "reference_id": "USN-8028-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-4/" }, { "reference_url": "https://usn.ubuntu.com/8028-5/", "reference_id": "USN-8028-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-5/" }, { "reference_url": "https://usn.ubuntu.com/8028-6/", "reference_id": "USN-8028-6", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-6/" }, { "reference_url": "https://usn.ubuntu.com/8028-7/", "reference_id": "USN-8028-7", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-7/" }, { "reference_url": "https://usn.ubuntu.com/8028-8/", "reference_id": "USN-8028-8", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-8/" }, { "reference_url": "https://usn.ubuntu.com/8031-1/", "reference_id": "USN-8031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-1/" }, { "reference_url": "https://usn.ubuntu.com/8031-2/", "reference_id": "USN-8031-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-2/" }, { "reference_url": "https://usn.ubuntu.com/8031-3/", "reference_id": "USN-8031-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-3/" }, { "reference_url": "https://usn.ubuntu.com/8052-1/", "reference_id": "USN-8052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-1/" }, { "reference_url": "https://usn.ubuntu.com/8052-2/", "reference_id": "USN-8052-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-2/" }, { "reference_url": "https://usn.ubuntu.com/8074-1/", "reference_id": "USN-8074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-1/" }, { "reference_url": "https://usn.ubuntu.com/8074-2/", "reference_id": "USN-8074-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-2/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-38459" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mu97-p4wb-5qck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67183?format=api", "vulnerability_id": "VCID-nxkh-as3r-cufe", "summary": "kernel: net/mlx5e: Check for NOT_READY flag state after locking", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53581.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53581.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53581", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0145", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01453", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0146", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01465", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01467", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01454", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01443", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01552", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0155", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0156", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01457", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01544", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02161", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.0216", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53581" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401545", "reference_id": "2401545", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1769", "reference_id": "RHSA-2020:1769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138", "reference_id": "RHSA-2024:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0537", "reference_id": "RHSA-2026:0537", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0537" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0576", "reference_id": "RHSA-2026:0576", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0576" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1441", "reference_id": "RHSA-2026:1441", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1441" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1443", "reference_id": "RHSA-2026:1443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1445", "reference_id": "RHSA-2026:1445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2490", "reference_id": "RHSA-2026:2490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2664", "reference_id": "RHSA-2026:2664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53581" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nxkh-as3r-cufe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68023?format=api", "vulnerability_id": "VCID-pvfh-earf-aqdj", "summary": "kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39760.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39760.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-39760", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04201", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04222", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05379", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05348", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05336", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05325", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05273", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05274", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05424", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05464", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05506", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05508", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05509", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05554", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05323", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05356", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-39760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39760" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394601", "reference_id": "2394601", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1661", "reference_id": "RHSA-2026:1661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1662", "reference_id": "RHSA-2026:1662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2212", "reference_id": "RHSA-2026:2212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2212" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2759", "reference_id": "RHSA-2026:2759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2766", "reference_id": "RHSA-2026:2766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3124", "reference_id": "RHSA-2026:3124", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3124" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3267", "reference_id": "RHSA-2026:3267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3268", "reference_id": "RHSA-2026:3268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3277", "reference_id": "RHSA-2026:3277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3293", "reference_id": "RHSA-2026:3293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3358", "reference_id": "RHSA-2026:3358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3358" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3375", "reference_id": "RHSA-2026:3375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3388", "reference_id": "RHSA-2026:3388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3634", "reference_id": "RHSA-2026:3634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3685", "reference_id": "RHSA-2026:3685", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3685" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4012", "reference_id": "RHSA-2026:4012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4012" }, { "reference_url": "https://usn.ubuntu.com/7909-1/", "reference_id": "USN-7909-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-1/" }, { "reference_url": "https://usn.ubuntu.com/7909-2/", "reference_id": "USN-7909-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-2/" }, { "reference_url": "https://usn.ubuntu.com/7909-3/", "reference_id": "USN-7909-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-3/" }, { "reference_url": "https://usn.ubuntu.com/7909-4/", "reference_id": "USN-7909-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-4/" }, { "reference_url": "https://usn.ubuntu.com/7909-5/", "reference_id": "USN-7909-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-5/" }, { "reference_url": "https://usn.ubuntu.com/7910-1/", "reference_id": "USN-7910-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7910-1/" }, { "reference_url": "https://usn.ubuntu.com/7910-2/", "reference_id": "USN-7910-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7910-2/" }, { "reference_url": "https://usn.ubuntu.com/7933-1/", "reference_id": "USN-7933-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7933-1/" }, { "reference_url": "https://usn.ubuntu.com/7938-1/", "reference_id": "USN-7938-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7938-1/" }, { "reference_url": "https://usn.ubuntu.com/8028-1/", "reference_id": "USN-8028-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-1/" }, { "reference_url": "https://usn.ubuntu.com/8028-2/", "reference_id": "USN-8028-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-2/" }, { "reference_url": "https://usn.ubuntu.com/8028-3/", "reference_id": "USN-8028-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-3/" }, { "reference_url": "https://usn.ubuntu.com/8028-4/", "reference_id": "USN-8028-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-4/" }, { "reference_url": "https://usn.ubuntu.com/8028-5/", "reference_id": "USN-8028-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-5/" }, { "reference_url": "https://usn.ubuntu.com/8028-6/", "reference_id": "USN-8028-6", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-6/" }, { "reference_url": "https://usn.ubuntu.com/8028-7/", "reference_id": "USN-8028-7", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-7/" }, { "reference_url": "https://usn.ubuntu.com/8028-8/", "reference_id": "USN-8028-8", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-8/" }, { "reference_url": "https://usn.ubuntu.com/8031-1/", "reference_id": "USN-8031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-1/" }, { "reference_url": "https://usn.ubuntu.com/8031-2/", "reference_id": "USN-8031-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-2/" }, { "reference_url": "https://usn.ubuntu.com/8031-3/", "reference_id": "USN-8031-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-3/" }, { "reference_url": "https://usn.ubuntu.com/8052-1/", "reference_id": "USN-8052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-1/" }, { "reference_url": "https://usn.ubuntu.com/8052-2/", "reference_id": "USN-8052-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-2/" }, { "reference_url": "https://usn.ubuntu.com/8074-1/", "reference_id": "USN-8074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-1/" }, { "reference_url": "https://usn.ubuntu.com/8074-2/", "reference_id": "USN-8074-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-2/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-39760" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pvfh-earf-aqdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65521?format=api", "vulnerability_id": "VCID-qb49-dkqp-gbgw", "summary": "kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68349.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68349.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-68349", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16694", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16546", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16631", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16684", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16621", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16561", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16499", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16508", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16441", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20814", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20879", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20847", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20741", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-68349" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68349", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68349" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424880", "reference_id": "2424880", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2264", "reference_id": "RHSA-2026:2264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2264" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2352", "reference_id": "RHSA-2026:2352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2378", "reference_id": "RHSA-2026:2378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2490", "reference_id": "RHSA-2026:2490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2664", "reference_id": "RHSA-2026:2664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2721", "reference_id": "RHSA-2026:2721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2722", "reference_id": "RHSA-2026:2722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2766", "reference_id": "RHSA-2026:2766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3267", "reference_id": "RHSA-2026:3267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3277", "reference_id": "RHSA-2026:3277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3293", "reference_id": "RHSA-2026:3293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3358", "reference_id": "RHSA-2026:3358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3358" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3375", "reference_id": "RHSA-2026:3375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3634", "reference_id": "RHSA-2026:3634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3685", "reference_id": "RHSA-2026:3685", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3685" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6193", "reference_id": "RHSA-2026:6193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6193" }, { "reference_url": "https://usn.ubuntu.com/8094-1/", "reference_id": "USN-8094-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-1/" }, { "reference_url": "https://usn.ubuntu.com/8094-2/", "reference_id": "USN-8094-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-2/" }, { "reference_url": "https://usn.ubuntu.com/8094-3/", "reference_id": "USN-8094-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-3/" }, { "reference_url": "https://usn.ubuntu.com/8094-4/", "reference_id": "USN-8094-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-4/" }, { "reference_url": "https://usn.ubuntu.com/8094-5/", "reference_id": "USN-8094-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-5/" }, { "reference_url": "https://usn.ubuntu.com/8096-1/", "reference_id": "USN-8096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-1/" }, { "reference_url": "https://usn.ubuntu.com/8096-2/", "reference_id": "USN-8096-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-2/" }, { "reference_url": "https://usn.ubuntu.com/8096-3/", "reference_id": "USN-8096-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-3/" }, { "reference_url": "https://usn.ubuntu.com/8096-4/", "reference_id": "USN-8096-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-4/" }, { "reference_url": "https://usn.ubuntu.com/8096-5/", "reference_id": "USN-8096-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-5/" }, { "reference_url": "https://usn.ubuntu.com/8116-1/", "reference_id": "USN-8116-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8116-1/" }, { "reference_url": "https://usn.ubuntu.com/8141-1/", "reference_id": "USN-8141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8141-1/" }, { "reference_url": "https://usn.ubuntu.com/8152-1/", "reference_id": "USN-8152-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8152-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-1/", "reference_id": "USN-8163-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-2/", "reference_id": "USN-8163-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-2/" }, { "reference_url": "https://usn.ubuntu.com/8179-1/", "reference_id": "USN-8179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8179-1/" }, { "reference_url": "https://usn.ubuntu.com/8179-2/", "reference_id": "USN-8179-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8179-2/" }, { "reference_url": "https://usn.ubuntu.com/8179-3/", "reference_id": "USN-8179-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8179-3/" }, { "reference_url": "https://usn.ubuntu.com/8179-4/", "reference_id": "USN-8179-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8179-4/" }, { "reference_url": "https://usn.ubuntu.com/8184-1/", "reference_id": "USN-8184-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8184-1/" }, { "reference_url": "https://usn.ubuntu.com/8185-1/", "reference_id": "USN-8185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8185-1/" }, { "reference_url": "https://usn.ubuntu.com/8185-2/", "reference_id": "USN-8185-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8185-2/" }, { "reference_url": "https://usn.ubuntu.com/8203-1/", "reference_id": "USN-8203-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8203-1/" }, { "reference_url": "https://usn.ubuntu.com/8204-1/", "reference_id": "USN-8204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8204-1/" }, { "reference_url": "https://usn.ubuntu.com/8243-1/", "reference_id": "USN-8243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8243-1/" }, { "reference_url": "https://usn.ubuntu.com/8258-1/", "reference_id": "USN-8258-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8258-1/" }, { "reference_url": "https://usn.ubuntu.com/8260-1/", "reference_id": "USN-8260-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8260-1/" }, { "reference_url": "https://usn.ubuntu.com/8261-1/", "reference_id": "USN-8261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8261-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-68349" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qb49-dkqp-gbgw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68514?format=api", "vulnerability_id": "VCID-qvnj-rkxf-ukas", "summary": "kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38415.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38415.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-38415", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0705", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07029", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07084", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06997", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07115", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08994", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.09029", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08981", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08872", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08848", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10226", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10259", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10239", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10263", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10115", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10171", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-38415" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38415", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38415" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2383404", "reference_id": "2383404", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2383404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1661", "reference_id": "RHSA-2026:1661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1662", "reference_id": "RHSA-2026:1662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2212", "reference_id": "RHSA-2026:2212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2212" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2282", "reference_id": "RHSA-2026:2282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2766", "reference_id": "RHSA-2026:2766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3088", "reference_id": "RHSA-2026:3088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3267", "reference_id": "RHSA-2026:3267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3268", "reference_id": "RHSA-2026:3268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3277", "reference_id": "RHSA-2026:3277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3293", "reference_id": "RHSA-2026:3293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3358", "reference_id": "RHSA-2026:3358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3358" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3375", "reference_id": "RHSA-2026:3375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3388", "reference_id": "RHSA-2026:3388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3579", "reference_id": "RHSA-2026:3579", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3579" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3634", "reference_id": "RHSA-2026:3634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3685", "reference_id": "RHSA-2026:3685", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3685" }, { "reference_url": "https://usn.ubuntu.com/7769-1/", "reference_id": "USN-7769-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7769-1/" }, { "reference_url": "https://usn.ubuntu.com/7769-2/", "reference_id": "USN-7769-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7769-2/" }, { "reference_url": "https://usn.ubuntu.com/7769-3/", "reference_id": "USN-7769-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7769-3/" }, { "reference_url": "https://usn.ubuntu.com/7770-1/", "reference_id": "USN-7770-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7770-1/" }, { "reference_url": "https://usn.ubuntu.com/7771-1/", "reference_id": "USN-7771-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7771-1/" }, { "reference_url": "https://usn.ubuntu.com/7774-1/", "reference_id": "USN-7774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7774-1/" }, { "reference_url": "https://usn.ubuntu.com/7774-2/", "reference_id": "USN-7774-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7774-2/" }, { "reference_url": "https://usn.ubuntu.com/7774-3/", "reference_id": "USN-7774-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7774-3/" }, { "reference_url": "https://usn.ubuntu.com/7774-4/", "reference_id": "USN-7774-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7774-4/" }, { "reference_url": "https://usn.ubuntu.com/7774-5/", "reference_id": "USN-7774-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7774-5/" }, { "reference_url": "https://usn.ubuntu.com/7775-1/", "reference_id": "USN-7775-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7775-1/" }, { "reference_url": "https://usn.ubuntu.com/7775-2/", "reference_id": "USN-7775-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7775-2/" }, { "reference_url": "https://usn.ubuntu.com/7775-3/", "reference_id": "USN-7775-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7775-3/" }, { "reference_url": "https://usn.ubuntu.com/7776-1/", "reference_id": "USN-7776-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7776-1/" }, { "reference_url": "https://usn.ubuntu.com/7789-1/", "reference_id": "USN-7789-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7789-1/" }, { "reference_url": "https://usn.ubuntu.com/7789-2/", "reference_id": "USN-7789-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7789-2/" }, { "reference_url": "https://usn.ubuntu.com/8028-1/", "reference_id": "USN-8028-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-1/" }, { "reference_url": "https://usn.ubuntu.com/8028-2/", "reference_id": "USN-8028-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-2/" }, { "reference_url": "https://usn.ubuntu.com/8028-3/", "reference_id": "USN-8028-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-3/" }, { "reference_url": "https://usn.ubuntu.com/8028-4/", "reference_id": "USN-8028-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-4/" }, { "reference_url": "https://usn.ubuntu.com/8028-5/", "reference_id": "USN-8028-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-5/" }, { "reference_url": "https://usn.ubuntu.com/8028-6/", "reference_id": "USN-8028-6", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-6/" }, { "reference_url": "https://usn.ubuntu.com/8028-7/", "reference_id": "USN-8028-7", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-7/" }, { "reference_url": "https://usn.ubuntu.com/8028-8/", "reference_id": "USN-8028-8", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-8/" }, { "reference_url": "https://usn.ubuntu.com/8031-1/", "reference_id": "USN-8031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-1/" }, { "reference_url": "https://usn.ubuntu.com/8031-2/", "reference_id": "USN-8031-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-2/" }, { "reference_url": "https://usn.ubuntu.com/8031-3/", "reference_id": "USN-8031-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-3/" }, { "reference_url": "https://usn.ubuntu.com/8052-1/", "reference_id": "USN-8052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-1/" }, { "reference_url": "https://usn.ubuntu.com/8052-2/", "reference_id": "USN-8052-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-2/" }, { "reference_url": "https://usn.ubuntu.com/8074-1/", "reference_id": "USN-8074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-1/" }, { "reference_url": "https://usn.ubuntu.com/8074-2/", "reference_id": "USN-8074-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-2/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-38415" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qvnj-rkxf-ukas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65446?format=api", "vulnerability_id": "VCID-vwpb-78dc-wuf7", "summary": "kernel: tcp: fix a signed-integer-overflow bug in tcp_add_backlog()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50865.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50865.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50865", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07533", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07514", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07593", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0759", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07576", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07564", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07569", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07549", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07518", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07488", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07476", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07608", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10091", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10239", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50865" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426226", "reference_id": "2426226", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1661", "reference_id": "RHSA-2026:1661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1662", "reference_id": "RHSA-2026:1662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1909", "reference_id": "RHSA-2026:1909", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1909" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1946", "reference_id": "RHSA-2026:1946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2490", "reference_id": "RHSA-2026:2490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2573", "reference_id": "RHSA-2026:2573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2577", "reference_id": "RHSA-2026:2577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3277", "reference_id": "RHSA-2026:3277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3388", "reference_id": "RHSA-2026:3388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3388" } ], "fixed_packages": [], "aliases": [ "CVE-2022-50865" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vwpb-78dc-wuf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69025?format=api", "vulnerability_id": "VCID-x7ch-ec75-7faz", "summary": "kernel: RDMA/core: Fix \"KASAN: slab-use-after-free Read in ib_register_device\" problem", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38022.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38022.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-38022", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06372", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06307", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06354", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06394", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06387", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06382", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06696", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06636", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19663", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19665", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19401", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19491", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19569", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.1952", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20296", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20427", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-38022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38022" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373326", "reference_id": "2373326", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1661", "reference_id": "RHSA-2026:1661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1662", "reference_id": "RHSA-2026:1662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1690", "reference_id": "RHSA-2026:1690", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2212", "reference_id": "RHSA-2026:2212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2212" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2352", "reference_id": "RHSA-2026:2352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2535", "reference_id": "RHSA-2026:2535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2560", "reference_id": "RHSA-2026:2560", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2560" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2583", "reference_id": "RHSA-2026:2583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2594", "reference_id": "RHSA-2026:2594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3268", "reference_id": "RHSA-2026:3268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3293", "reference_id": "RHSA-2026:3293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3375", "reference_id": "RHSA-2026:3375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3388", "reference_id": "RHSA-2026:3388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3388" }, { "reference_url": "https://usn.ubuntu.com/7699-1/", "reference_id": "USN-7699-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7699-1/" }, { "reference_url": "https://usn.ubuntu.com/7699-2/", "reference_id": "USN-7699-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7699-2/" }, { "reference_url": "https://usn.ubuntu.com/7721-1/", "reference_id": "USN-7721-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7721-1/" }, { "reference_url": "https://usn.ubuntu.com/8096-1/", "reference_id": "USN-8096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-1/" }, { "reference_url": "https://usn.ubuntu.com/8096-2/", "reference_id": "USN-8096-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-2/" }, { "reference_url": "https://usn.ubuntu.com/8096-3/", "reference_id": "USN-8096-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-3/" }, { "reference_url": "https://usn.ubuntu.com/8096-4/", "reference_id": "USN-8096-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-4/" }, { "reference_url": "https://usn.ubuntu.com/8096-5/", "reference_id": "USN-8096-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-5/" }, { "reference_url": "https://usn.ubuntu.com/8116-1/", "reference_id": "USN-8116-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8116-1/" }, { "reference_url": "https://usn.ubuntu.com/8141-1/", "reference_id": "USN-8141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8141-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-1/", "reference_id": "USN-8163-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-2/", "reference_id": "USN-8163-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-2/" }, { "reference_url": "https://usn.ubuntu.com/8179-1/", "reference_id": "USN-8179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8179-1/" }, { "reference_url": "https://usn.ubuntu.com/8179-2/", "reference_id": "USN-8179-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8179-2/" }, { "reference_url": "https://usn.ubuntu.com/8179-3/", "reference_id": "USN-8179-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8179-3/" }, { "reference_url": "https://usn.ubuntu.com/8179-4/", "reference_id": "USN-8179-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8179-4/" }, { "reference_url": "https://usn.ubuntu.com/8184-1/", "reference_id": "USN-8184-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8184-1/" }, { "reference_url": "https://usn.ubuntu.com/8185-1/", "reference_id": "USN-8185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8185-1/" }, { "reference_url": "https://usn.ubuntu.com/8185-2/", "reference_id": "USN-8185-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8185-2/" }, { "reference_url": "https://usn.ubuntu.com/8203-1/", "reference_id": "USN-8203-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8203-1/" }, { "reference_url": "https://usn.ubuntu.com/8204-1/", "reference_id": "USN-8204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8204-1/" }, { "reference_url": "https://usn.ubuntu.com/8243-1/", "reference_id": "USN-8243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8243-1/" }, { "reference_url": "https://usn.ubuntu.com/8258-1/", "reference_id": "USN-8258-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8258-1/" }, { "reference_url": "https://usn.ubuntu.com/8260-1/", "reference_id": "USN-8260-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8260-1/" }, { "reference_url": "https://usn.ubuntu.com/8261-1/", "reference_id": "USN-8261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8261-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-38022" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x7ch-ec75-7faz" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-305.186.1%3Farch=el8_4" }