{"url":"http://public2.vulnerablecode.io/api/packages/87573?format=json","purl":"pkg:rpm/redhat/kernel@4.18.0-477.13.1?arch=el8_8","type":"rpm","namespace":"redhat","name":"kernel","version":"4.18.0-477.13.1","qualifiers":{"arch":"el8_8"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65286?format=json","vulnerability_id":"VCID-fah9-g62s-s3h1","summary":"kernel: crypto: qat - fix out-of-bounds read","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54325.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54325.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54325","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09895","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10116","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1009","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-54325"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426061","reference_id":"2426061","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426061"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3349","reference_id":"RHSA-2023:3349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3723","reference_id":"RHSA-2023:3723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2023-54325"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fah9-g62s-s3h1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78451?format=json","vulnerability_id":"VCID-uqu9-hbxy-kqeh","summary":"kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32233.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32233.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32233","reference_id":"","reference_type":"","scores":[{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.69013","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68969","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71515","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71437","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71455","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71429","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.7147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71482","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71504","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71488","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71521","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71561","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71976","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71926","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71971","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72313","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72579","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72606","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196105","reference_id":"2196105","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196105"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/05/08/4","reference_id":"4","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/05/08/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/05/15/5","reference_id":"5","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/05/15/5"},{"reference_url":"https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab","reference_id":"c1592a89942e9678f7d9c8030efa777c0d57edab","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab"},{"reference_url":"https://www.debian.org/security/2023/dsa-5402","reference_id":"dsa-5402","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://www.debian.org/security/2023/dsa-5402"},{"reference_url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab","reference_id":"?id=c1592a89942e9678f7d9c8030efa777c0d57edab","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab"},{"reference_url":"https://news.ycombinator.com/item?id=35879660","reference_id":"item?id=35879660","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://news.ycombinator.com/item?id=35879660"},{"reference_url":"http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0095-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230616-0002/","reference_id":"ntap-20230616-0002","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230616-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3349","reference_id":"RHSA-2023:3349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3350","reference_id":"RHSA-2023:3350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3351","reference_id":"RHSA-2023:3351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3465","reference_id":"RHSA-2023:3465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3470","reference_id":"RHSA-2023:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3490","reference_id":"RHSA-2023:3490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3705","reference_id":"RHSA-2023:3705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3708","reference_id":"RHSA-2023:3708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3723","reference_id":"RHSA-2023:3723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3852","reference_id":"RHSA-2023:3852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3852"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3853","reference_id":"RHSA-2023:3853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3853"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4125","reference_id":"RHSA-2023:4125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4126","reference_id":"RHSA-2023:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4130","reference_id":"RHSA-2023:4130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4145","reference_id":"RHSA-2023:4145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4146","reference_id":"RHSA-2023:4146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4255","reference_id":"RHSA-2023:4255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4256","reference_id":"RHSA-2023:4256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4262","reference_id":"RHSA-2023:4262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4262"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4696","reference_id":"RHSA-2023:4696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4699","reference_id":"RHSA-2023:4699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5419","reference_id":"RHSA-2023:5419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5574","reference_id":"RHSA-2023:5574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5621","reference_id":"RHSA-2023:5621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5622","reference_id":"RHSA-2023:5622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5622"},{"reference_url":"https://usn.ubuntu.com/6122-1/","reference_id":"USN-6122-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6122-1/"},{"reference_url":"https://usn.ubuntu.com/6123-1/","reference_id":"USN-6123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6123-1/"},{"reference_url":"https://usn.ubuntu.com/6124-1/","reference_id":"USN-6124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6124-1/"},{"reference_url":"https://usn.ubuntu.com/6127-1/","reference_id":"USN-6127-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6127-1/"},{"reference_url":"https://usn.ubuntu.com/6130-1/","reference_id":"USN-6130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6130-1/"},{"reference_url":"https://usn.ubuntu.com/6131-1/","reference_id":"USN-6131-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6131-1/"},{"reference_url":"https://usn.ubuntu.com/6132-1/","reference_id":"USN-6132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6132-1/"},{"reference_url":"https://usn.ubuntu.com/6135-1/","reference_id":"USN-6135-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6135-1/"},{"reference_url":"https://usn.ubuntu.com/6149-1/","reference_id":"USN-6149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6149-1/"},{"reference_url":"https://usn.ubuntu.com/6150-1/","reference_id":"USN-6150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6150-1/"},{"reference_url":"https://usn.ubuntu.com/6162-1/","reference_id":"USN-6162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6162-1/"},{"reference_url":"https://usn.ubuntu.com/6175-1/","reference_id":"USN-6175-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6175-1/"},{"reference_url":"https://usn.ubuntu.com/6186-1/","reference_id":"USN-6186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6186-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2023-32233"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uqu9-hbxy-kqeh"}],"fixing_vulnerabilities":[],"risk_score":"3.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-477.13.1%3Farch=el8_8"}