{"url":"http://public2.vulnerablecode.io/api/packages/87454?format=json","purl":"pkg:rpm/redhat/kernel@5.14.0-570.98.1?arch=el9_6","type":"rpm","namespace":"redhat","name":"kernel","version":"5.14.0-570.98.1","qualifiers":{"arch":"el9_6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66356?format=json","vulnerability_id":"VCID-6faj-ta9a-cyfn","summary":"kernel: sctp: avoid NULL dereference when chunk data buffer is missing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40240.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40240.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40240","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06478","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08509","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0828","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08421","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08481","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14549","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14383","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14384","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14454","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14487","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14628","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14483","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40240"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40240","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40240"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418832","reference_id":"2418832","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418832"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0443","reference_id":"RHSA-2026:0443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0444","reference_id":"RHSA-2026:0444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0445","reference_id":"RHSA-2026:0445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0453","reference_id":"RHSA-2026:0453","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0453"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14869","reference_id":"RHSA-2026:14869","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14925","reference_id":"RHSA-2026:14925","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14925"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1727","reference_id":"RHSA-2026:1727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2535","reference_id":"RHSA-2026:2535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4745","reference_id":"RHSA-2026:4745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4899","reference_id":"RHSA-2026:4899","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5690","reference_id":"RHSA-2026:5690","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5691","reference_id":"RHSA-2026:5691","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5691"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5693","reference_id":"RHSA-2026:5693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5693"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5727","reference_id":"RHSA-2026:5727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5732","reference_id":"RHSA-2026:5732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5813","reference_id":"RHSA-2026:5813","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5813"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7003","reference_id":"RHSA-2026:7003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7003"},{"reference_url":"https://usn.ubuntu.com/8029-1/","reference_id":"USN-8029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-1/"},{"reference_url":"https://usn.ubuntu.com/8029-2/","reference_id":"USN-8029-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-2/"},{"reference_url":"https://usn.ubuntu.com/8029-3/","reference_id":"USN-8029-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-3/"},{"reference_url":"https://usn.ubuntu.com/8030-1/","reference_id":"USN-8030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8030-1/"},{"reference_url":"https://usn.ubuntu.com/8033-1/","reference_id":"USN-8033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-1/"},{"reference_url":"https://usn.ubuntu.com/8033-2/","reference_id":"USN-8033-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-2/"},{"reference_url":"https://usn.ubuntu.com/8033-3/","reference_id":"USN-8033-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-3/"},{"reference_url":"https://usn.ubuntu.com/8033-4/","reference_id":"USN-8033-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-4/"},{"reference_url":"https://usn.ubuntu.com/8033-5/","reference_id":"USN-8033-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-5/"},{"reference_url":"https://usn.ubuntu.com/8033-6/","reference_id":"USN-8033-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-6/"},{"reference_url":"https://usn.ubuntu.com/8033-7/","reference_id":"USN-8033-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-7/"},{"reference_url":"https://usn.ubuntu.com/8033-8/","reference_id":"USN-8033-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-8/"},{"reference_url":"https://usn.ubuntu.com/8034-1/","reference_id":"USN-8034-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8034-1/"},{"reference_url":"https://usn.ubuntu.com/8034-2/","reference_id":"USN-8034-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8034-2/"},{"reference_url":"https://usn.ubuntu.com/8048-1/","reference_id":"USN-8048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8048-1/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"}],"fixed_packages":[],"aliases":["CVE-2025-40240"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6faj-ta9a-cyfn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72343?format=json","vulnerability_id":"VCID-em4y-ggvw-6bc3","summary":"kernel: RDMA/rxe: Fix the qp flush warnings in req","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53229.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53229.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-53229","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01888","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01975","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0196","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01956","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01985","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01937","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01928","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01952","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02607","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02785","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02786","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02641","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02645","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02808","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-53229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53229"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334357","reference_id":"2334357","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334357"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20518","reference_id":"RHSA-2025:20518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4745","reference_id":"RHSA-2026:4745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4745"},{"reference_url":"https://usn.ubuntu.com/7276-1/","reference_id":"USN-7276-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7276-1/"},{"reference_url":"https://usn.ubuntu.com/7277-1/","reference_id":"USN-7277-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7277-1/"},{"reference_url":"https://usn.ubuntu.com/7310-1/","reference_id":"USN-7310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7310-1/"},{"reference_url":"https://usn.ubuntu.com/7449-1/","reference_id":"USN-7449-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7449-1/"},{"reference_url":"https://usn.ubuntu.com/7449-2/","reference_id":"USN-7449-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7449-2/"},{"reference_url":"https://usn.ubuntu.com/7450-1/","reference_id":"USN-7450-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7450-1/"},{"reference_url":"https://usn.ubuntu.com/7451-1/","reference_id":"USN-7451-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7451-1/"},{"reference_url":"https://usn.ubuntu.com/7452-1/","reference_id":"USN-7452-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7452-1/"},{"reference_url":"https://usn.ubuntu.com/7453-1/","reference_id":"USN-7453-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7453-1/"},{"reference_url":"https://usn.ubuntu.com/7468-1/","reference_id":"USN-7468-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7468-1/"},{"reference_url":"https://usn.ubuntu.com/7523-1/","reference_id":"USN-7523-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7523-1/"},{"reference_url":"https://usn.ubuntu.com/7524-1/","reference_id":"USN-7524-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7524-1/"}],"fixed_packages":[],"aliases":["CVE-2024-53229"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-em4y-ggvw-6bc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65152?format=json","vulnerability_id":"VCID-jpe6-w1pt-z7g9","summary":"kernel: svcrdma: use rc_pageoff for memcpy byte offset","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68811.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68811","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06942","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06914","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06937","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07087","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07175","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07156","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0717","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68811"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429116","reference_id":"2429116","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429116"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2282","reference_id":"RHSA-2026:2282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2722","reference_id":"RHSA-2026:2722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4745","reference_id":"RHSA-2026:4745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6692","reference_id":"RHSA-2026:6692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6692"},{"reference_url":"https://usn.ubuntu.com/8177-1/","reference_id":"USN-8177-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8177-1/"},{"reference_url":"https://usn.ubuntu.com/8177-2/","reference_id":"USN-8177-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8177-2/"},{"reference_url":"https://usn.ubuntu.com/8179-1/","reference_id":"USN-8179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-1/"},{"reference_url":"https://usn.ubuntu.com/8179-2/","reference_id":"USN-8179-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-2/"},{"reference_url":"https://usn.ubuntu.com/8179-3/","reference_id":"USN-8179-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-3/"},{"reference_url":"https://usn.ubuntu.com/8179-4/","reference_id":"USN-8179-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-4/"},{"reference_url":"https://usn.ubuntu.com/8183-1/","reference_id":"USN-8183-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8183-1/"},{"reference_url":"https://usn.ubuntu.com/8183-2/","reference_id":"USN-8183-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8183-2/"},{"reference_url":"https://usn.ubuntu.com/8184-1/","reference_id":"USN-8184-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8184-1/"},{"reference_url":"https://usn.ubuntu.com/8185-1/","reference_id":"USN-8185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8185-1/"},{"reference_url":"https://usn.ubuntu.com/8185-2/","reference_id":"USN-8185-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8185-2/"},{"reference_url":"https://usn.ubuntu.com/8203-1/","reference_id":"USN-8203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8203-1/"},{"reference_url":"https://usn.ubuntu.com/8204-1/","reference_id":"USN-8204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8204-1/"},{"reference_url":"https://usn.ubuntu.com/8245-1/","reference_id":"USN-8245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8245-1/"},{"reference_url":"https://usn.ubuntu.com/8257-1/","reference_id":"USN-8257-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8257-1/"},{"reference_url":"https://usn.ubuntu.com/8258-1/","reference_id":"USN-8258-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8258-1/"},{"reference_url":"https://usn.ubuntu.com/8260-1/","reference_id":"USN-8260-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8260-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"},{"reference_url":"https://usn.ubuntu.com/8265-1/","reference_id":"USN-8265-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8265-1/"}],"fixed_packages":[],"aliases":["CVE-2025-68811"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jpe6-w1pt-z7g9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65067?format=json","vulnerability_id":"VCID-uaka-4bcz-77du","summary":"kernel: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-71085.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-71085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-71085","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0702","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07055","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07085","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07071","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07011","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06995","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07128","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07097","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07103","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07064","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0708","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07235","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07318","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.073","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07316","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-71085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71085"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429026","reference_id":"2429026","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3488","reference_id":"RHSA-2026:3488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3963","reference_id":"RHSA-2026:3963","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3963"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3964","reference_id":"RHSA-2026:3964","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3964"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4012","reference_id":"RHSA-2026:4012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4246","reference_id":"RHSA-2026:4246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4745","reference_id":"RHSA-2026:4745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5689","reference_id":"RHSA-2026:5689","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5689"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5690","reference_id":"RHSA-2026:5690","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5691","reference_id":"RHSA-2026:5691","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5691"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5693","reference_id":"RHSA-2026:5693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5693"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5727","reference_id":"RHSA-2026:5727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5732","reference_id":"RHSA-2026:5732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5813","reference_id":"RHSA-2026:5813","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5813"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6193","reference_id":"RHSA-2026:6193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7003","reference_id":"RHSA-2026:7003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7003"},{"reference_url":"https://usn.ubuntu.com/8096-1/","reference_id":"USN-8096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-1/"},{"reference_url":"https://usn.ubuntu.com/8096-2/","reference_id":"USN-8096-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-2/"},{"reference_url":"https://usn.ubuntu.com/8096-3/","reference_id":"USN-8096-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-3/"},{"reference_url":"https://usn.ubuntu.com/8096-4/","reference_id":"USN-8096-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-4/"},{"reference_url":"https://usn.ubuntu.com/8096-5/","reference_id":"USN-8096-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-5/"},{"reference_url":"https://usn.ubuntu.com/8116-1/","reference_id":"USN-8116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8116-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8177-1/","reference_id":"USN-8177-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8177-1/"},{"reference_url":"https://usn.ubuntu.com/8177-2/","reference_id":"USN-8177-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8177-2/"},{"reference_url":"https://usn.ubuntu.com/8179-1/","reference_id":"USN-8179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-1/"},{"reference_url":"https://usn.ubuntu.com/8179-2/","reference_id":"USN-8179-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-2/"},{"reference_url":"https://usn.ubuntu.com/8179-3/","reference_id":"USN-8179-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-3/"},{"reference_url":"https://usn.ubuntu.com/8179-4/","reference_id":"USN-8179-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-4/"},{"reference_url":"https://usn.ubuntu.com/8183-1/","reference_id":"USN-8183-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8183-1/"},{"reference_url":"https://usn.ubuntu.com/8183-2/","reference_id":"USN-8183-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8183-2/"},{"reference_url":"https://usn.ubuntu.com/8184-1/","reference_id":"USN-8184-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8184-1/"},{"reference_url":"https://usn.ubuntu.com/8185-1/","reference_id":"USN-8185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8185-1/"},{"reference_url":"https://usn.ubuntu.com/8185-2/","reference_id":"USN-8185-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8185-2/"},{"reference_url":"https://usn.ubuntu.com/8203-1/","reference_id":"USN-8203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8203-1/"},{"reference_url":"https://usn.ubuntu.com/8204-1/","reference_id":"USN-8204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8204-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8245-1/","reference_id":"USN-8245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8245-1/"},{"reference_url":"https://usn.ubuntu.com/8257-1/","reference_id":"USN-8257-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8257-1/"},{"reference_url":"https://usn.ubuntu.com/8258-1/","reference_id":"USN-8258-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8258-1/"},{"reference_url":"https://usn.ubuntu.com/8260-1/","reference_id":"USN-8260-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8260-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"},{"reference_url":"https://usn.ubuntu.com/8265-1/","reference_id":"USN-8265-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8265-1/"}],"fixed_packages":[],"aliases":["CVE-2025-71085"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uaka-4bcz-77du"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68837?format=json","vulnerability_id":"VCID-ycev-sqxs-13da","summary":"kernel: Kernel: Double free vulnerability in exFAT filesystem can lead to denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38206.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38206","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07265","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07309","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07292","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07348","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07271","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07358","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07276","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07409","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07377","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0735","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21481","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.215","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21353","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21504","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21419","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38206"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376377","reference_id":"2376377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3066","reference_id":"RHSA-2026:3066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3275","reference_id":"RHSA-2026:3275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4246","reference_id":"RHSA-2026:4246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4745","reference_id":"RHSA-2026:4745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6948","reference_id":"RHSA-2026:6948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6986","reference_id":"RHSA-2026:6986","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6986"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7013","reference_id":"RHSA-2026:7013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7100","reference_id":"RHSA-2026:7100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7100"},{"reference_url":"https://usn.ubuntu.com/7774-1/","reference_id":"USN-7774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-1/"},{"reference_url":"https://usn.ubuntu.com/7774-2/","reference_id":"USN-7774-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-2/"},{"reference_url":"https://usn.ubuntu.com/7774-3/","reference_id":"USN-7774-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-3/"},{"reference_url":"https://usn.ubuntu.com/7774-4/","reference_id":"USN-7774-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-4/"},{"reference_url":"https://usn.ubuntu.com/7774-5/","reference_id":"USN-7774-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-5/"},{"reference_url":"https://usn.ubuntu.com/7775-1/","reference_id":"USN-7775-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-1/"},{"reference_url":"https://usn.ubuntu.com/7775-2/","reference_id":"USN-7775-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-2/"},{"reference_url":"https://usn.ubuntu.com/7775-3/","reference_id":"USN-7775-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-3/"},{"reference_url":"https://usn.ubuntu.com/7776-1/","reference_id":"USN-7776-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7776-1/"},{"reference_url":"https://usn.ubuntu.com/7833-1/","reference_id":"USN-7833-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-1/"},{"reference_url":"https://usn.ubuntu.com/7833-2/","reference_id":"USN-7833-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-2/"},{"reference_url":"https://usn.ubuntu.com/7833-3/","reference_id":"USN-7833-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-3/"},{"reference_url":"https://usn.ubuntu.com/7833-4/","reference_id":"USN-7833-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-4/"},{"reference_url":"https://usn.ubuntu.com/7834-1/","reference_id":"USN-7834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7834-1/"},{"reference_url":"https://usn.ubuntu.com/7856-1/","reference_id":"USN-7856-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7856-1/"}],"fixed_packages":[],"aliases":["CVE-2025-38206"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ycev-sqxs-13da"}],"fixing_vulnerabilities":[],"risk_score":"3.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-570.98.1%3Farch=el9_6"}