{"url":"http://public2.vulnerablecode.io/api/packages/87463?format=json","purl":"pkg:rpm/redhat/kernel@6.12.0-124.39.1?arch=el10_1","type":"rpm","namespace":"redhat","name":"kernel","version":"6.12.0-124.39.1","qualifiers":{"arch":"el10_1"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65102?format=json","vulnerability_id":"VCID-6u26-3zuf-xqee","summary":"kernel: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68800.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68800.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68800","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16546","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16631","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16684","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16621","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16499","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16508","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16441","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16434","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16389","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16255","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16372","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68800"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429065","reference_id":"2429065","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10108","reference_id":"RHSA-2026:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3083","reference_id":"RHSA-2026:3083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3110","reference_id":"RHSA-2026:3110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3275","reference_id":"RHSA-2026:3275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3966","reference_id":"RHSA-2026:3966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4759","reference_id":"RHSA-2026:4759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6164","reference_id":"RHSA-2026:6164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9512","reference_id":"RHSA-2026:9512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9644","reference_id":"RHSA-2026:9644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9644"},{"reference_url":"https://usn.ubuntu.com/8096-1/","reference_id":"USN-8096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-1/"},{"reference_url":"https://usn.ubuntu.com/8096-2/","reference_id":"USN-8096-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-2/"},{"reference_url":"https://usn.ubuntu.com/8096-3/","reference_id":"USN-8096-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-3/"},{"reference_url":"https://usn.ubuntu.com/8096-4/","reference_id":"USN-8096-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-4/"},{"reference_url":"https://usn.ubuntu.com/8096-5/","reference_id":"USN-8096-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-5/"},{"reference_url":"https://usn.ubuntu.com/8116-1/","reference_id":"USN-8116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8116-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8177-1/","reference_id":"USN-8177-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8177-1/"},{"reference_url":"https://usn.ubuntu.com/8177-2/","reference_id":"USN-8177-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8177-2/"},{"reference_url":"https://usn.ubuntu.com/8179-1/","reference_id":"USN-8179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-1/"},{"reference_url":"https://usn.ubuntu.com/8179-2/","reference_id":"USN-8179-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-2/"},{"reference_url":"https://usn.ubuntu.com/8179-3/","reference_id":"USN-8179-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-3/"},{"reference_url":"https://usn.ubuntu.com/8179-4/","reference_id":"USN-8179-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-4/"},{"reference_url":"https://usn.ubuntu.com/8183-1/","reference_id":"USN-8183-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8183-1/"},{"reference_url":"https://usn.ubuntu.com/8183-2/","reference_id":"USN-8183-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8183-2/"},{"reference_url":"https://usn.ubuntu.com/8184-1/","reference_id":"USN-8184-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8184-1/"},{"reference_url":"https://usn.ubuntu.com/8185-1/","reference_id":"USN-8185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8185-1/"},{"reference_url":"https://usn.ubuntu.com/8185-2/","reference_id":"USN-8185-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8185-2/"},{"reference_url":"https://usn.ubuntu.com/8203-1/","reference_id":"USN-8203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8203-1/"},{"reference_url":"https://usn.ubuntu.com/8204-1/","reference_id":"USN-8204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8204-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8245-1/","reference_id":"USN-8245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8245-1/"},{"reference_url":"https://usn.ubuntu.com/8257-1/","reference_id":"USN-8257-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8257-1/"},{"reference_url":"https://usn.ubuntu.com/8258-1/","reference_id":"USN-8258-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8258-1/"},{"reference_url":"https://usn.ubuntu.com/8260-1/","reference_id":"USN-8260-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8260-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"}],"fixed_packages":[],"aliases":["CVE-2025-68800"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6u26-3zuf-xqee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66632?format=json","vulnerability_id":"VCID-e2pp-vkfh-4qej","summary":"kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40096.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40096.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40096","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12644","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12452","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12532","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17502","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17511","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17545","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17455","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17432","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17363","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17227","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17317","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17638","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17557","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40096"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2407333","reference_id":"2407333","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2407333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0759","reference_id":"RHSA-2026:0759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0760","reference_id":"RHSA-2026:0760","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0760"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1879","reference_id":"RHSA-2026:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2535","reference_id":"RHSA-2026:2535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2560","reference_id":"RHSA-2026:2560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2583","reference_id":"RHSA-2026:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3275","reference_id":"RHSA-2026:3275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6153","reference_id":"RHSA-2026:6153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6164","reference_id":"RHSA-2026:6164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6193","reference_id":"RHSA-2026:6193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6193"},{"reference_url":"https://usn.ubuntu.com/8029-1/","reference_id":"USN-8029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-1/"},{"reference_url":"https://usn.ubuntu.com/8029-2/","reference_id":"USN-8029-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-2/"},{"reference_url":"https://usn.ubuntu.com/8029-3/","reference_id":"USN-8029-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-3/"},{"reference_url":"https://usn.ubuntu.com/8030-1/","reference_id":"USN-8030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8030-1/"},{"reference_url":"https://usn.ubuntu.com/8048-1/","reference_id":"USN-8048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8048-1/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"}],"fixed_packages":[],"aliases":["CVE-2025-40096"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e2pp-vkfh-4qej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66506?format=json","vulnerability_id":"VCID-edst-7exd-zud8","summary":"kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40168.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40168.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40168","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05395","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05415","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05402","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05344","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05346","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05509","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05455","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07296","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07167","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07125","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07141","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10471","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10539","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10403","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10476","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10544","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40168"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414482","reference_id":"2414482","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414482"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2720","reference_id":"RHSA-2026:2720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2821","reference_id":"RHSA-2026:2821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3275","reference_id":"RHSA-2026:3275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3488","reference_id":"RHSA-2026:3488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4111","reference_id":"RHSA-2026:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6954","reference_id":"RHSA-2026:6954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9513","reference_id":"RHSA-2026:9513","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9513"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9514","reference_id":"RHSA-2026:9514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9643","reference_id":"RHSA-2026:9643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9643"},{"reference_url":"https://usn.ubuntu.com/8029-1/","reference_id":"USN-8029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-1/"},{"reference_url":"https://usn.ubuntu.com/8029-2/","reference_id":"USN-8029-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-2/"},{"reference_url":"https://usn.ubuntu.com/8029-3/","reference_id":"USN-8029-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-3/"},{"reference_url":"https://usn.ubuntu.com/8030-1/","reference_id":"USN-8030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8030-1/"},{"reference_url":"https://usn.ubuntu.com/8048-1/","reference_id":"USN-8048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8048-1/"}],"fixed_packages":[],"aliases":["CVE-2025-40168"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-edst-7exd-zud8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68837?format=json","vulnerability_id":"VCID-ycev-sqxs-13da","summary":"kernel: Kernel: Double free vulnerability in exFAT filesystem can lead to denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38206.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38206","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07265","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07309","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07292","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07348","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07409","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07377","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0735","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07358","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07276","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07271","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21419","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21353","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38206"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376377","reference_id":"2376377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3066","reference_id":"RHSA-2026:3066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3275","reference_id":"RHSA-2026:3275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4246","reference_id":"RHSA-2026:4246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4745","reference_id":"RHSA-2026:4745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6948","reference_id":"RHSA-2026:6948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6986","reference_id":"RHSA-2026:6986","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6986"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7013","reference_id":"RHSA-2026:7013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7100","reference_id":"RHSA-2026:7100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7100"},{"reference_url":"https://usn.ubuntu.com/7774-1/","reference_id":"USN-7774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-1/"},{"reference_url":"https://usn.ubuntu.com/7774-2/","reference_id":"USN-7774-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-2/"},{"reference_url":"https://usn.ubuntu.com/7774-3/","reference_id":"USN-7774-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-3/"},{"reference_url":"https://usn.ubuntu.com/7774-4/","reference_id":"USN-7774-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-4/"},{"reference_url":"https://usn.ubuntu.com/7774-5/","reference_id":"USN-7774-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-5/"},{"reference_url":"https://usn.ubuntu.com/7775-1/","reference_id":"USN-7775-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-1/"},{"reference_url":"https://usn.ubuntu.com/7775-2/","reference_id":"USN-7775-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-2/"},{"reference_url":"https://usn.ubuntu.com/7775-3/","reference_id":"USN-7775-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-3/"},{"reference_url":"https://usn.ubuntu.com/7776-1/","reference_id":"USN-7776-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7776-1/"},{"reference_url":"https://usn.ubuntu.com/7833-1/","reference_id":"USN-7833-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-1/"},{"reference_url":"https://usn.ubuntu.com/7833-2/","reference_id":"USN-7833-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-2/"},{"reference_url":"https://usn.ubuntu.com/7833-3/","reference_id":"USN-7833-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-3/"},{"reference_url":"https://usn.ubuntu.com/7833-4/","reference_id":"USN-7833-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-4/"},{"reference_url":"https://usn.ubuntu.com/7834-1/","reference_id":"USN-7834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7834-1/"},{"reference_url":"https://usn.ubuntu.com/7856-1/","reference_id":"USN-7856-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7856-1/"}],"fixed_packages":[],"aliases":["CVE-2025-38206"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ycev-sqxs-13da"}],"fixing_vulnerabilities":[],"risk_score":"3.3","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@6.12.0-124.39.1%3Farch=el10_1"}