{"url":"http://public2.vulnerablecode.io/api/packages/87585?format=json","purl":"pkg:rpm/redhat/kernel-rt@5.14.0-284.155.1.rt14.440?arch=el9_2","type":"rpm","namespace":"redhat","name":"kernel-rt","version":"5.14.0-284.155.1.rt14.440","qualifiers":{"arch":"el9_2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66371?format=json","vulnerability_id":"VCID-enr2-4j6n-jqf7","summary":"kernel: Linux kernel: vsock vulnerability may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40248.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40248.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40248","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21111","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21121","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21077","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21015","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21004","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20877","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20879","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20847","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2105","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40248"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418872","reference_id":"2418872","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1142","reference_id":"RHSA-2026:1142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1143","reference_id":"RHSA-2026:1143","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1143"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1148","reference_id":"RHSA-2026:1148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1442","reference_id":"RHSA-2026:1442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1445","reference_id":"RHSA-2026:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1494","reference_id":"RHSA-2026:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1495","reference_id":"RHSA-2026:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1512","reference_id":"RHSA-2026:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1581","reference_id":"RHSA-2026:1581","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1581"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1623","reference_id":"RHSA-2026:1623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1690","reference_id":"RHSA-2026:1690","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1703","reference_id":"RHSA-2026:1703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1727","reference_id":"RHSA-2026:1727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1879","reference_id":"RHSA-2026:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1886","reference_id":"RHSA-2026:1886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1909","reference_id":"RHSA-2026:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1946","reference_id":"RHSA-2026:1946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3848","reference_id":"RHSA-2026:3848","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3865","reference_id":"RHSA-2026:3865","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3866","reference_id":"RHSA-2026:3866","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3867","reference_id":"RHSA-2026:3867","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3867"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3868","reference_id":"RHSA-2026:3868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3873","reference_id":"RHSA-2026:3873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3886","reference_id":"RHSA-2026:3886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3987","reference_id":"RHSA-2026:3987","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3987"},{"reference_url":"https://usn.ubuntu.com/8094-1/","reference_id":"USN-8094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-1/"},{"reference_url":"https://usn.ubuntu.com/8094-2/","reference_id":"USN-8094-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-2/"},{"reference_url":"https://usn.ubuntu.com/8094-3/","reference_id":"USN-8094-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-3/"},{"reference_url":"https://usn.ubuntu.com/8094-4/","reference_id":"USN-8094-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-4/"},{"reference_url":"https://usn.ubuntu.com/8094-5/","reference_id":"USN-8094-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-5/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8096-1/","reference_id":"USN-8096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-1/"},{"reference_url":"https://usn.ubuntu.com/8096-2/","reference_id":"USN-8096-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-2/"},{"reference_url":"https://usn.ubuntu.com/8096-3/","reference_id":"USN-8096-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-3/"},{"reference_url":"https://usn.ubuntu.com/8096-4/","reference_id":"USN-8096-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-4/"},{"reference_url":"https://usn.ubuntu.com/8096-5/","reference_id":"USN-8096-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8116-1/","reference_id":"USN-8116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8116-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8152-1/","reference_id":"USN-8152-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8152-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"}],"fixed_packages":[],"aliases":["CVE-2025-40248"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-enr2-4j6n-jqf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66039?format=json","vulnerability_id":"VCID-qfge-zawt-qyb3","summary":"kernel: net: atlantic: fix fragment overflow handling in RX path","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68301.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68301.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68301","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16631","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16684","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16621","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16499","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20847","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21004","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20877","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20879","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2422836","reference_id":"2422836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2422836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0759","reference_id":"RHSA-2026:0759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0760","reference_id":"RHSA-2026:0760","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0760"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1143","reference_id":"RHSA-2026:1143","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1143"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1690","reference_id":"RHSA-2026:1690","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1703","reference_id":"RHSA-2026:1703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1727","reference_id":"RHSA-2026:1727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1879","reference_id":"RHSA-2026:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1886","reference_id":"RHSA-2026:1886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1909","reference_id":"RHSA-2026:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1946","reference_id":"RHSA-2026:1946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2535","reference_id":"RHSA-2026:2535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2573","reference_id":"RHSA-2026:2573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2577","reference_id":"RHSA-2026:2577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2664","reference_id":"RHSA-2026:2664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2664"},{"reference_url":"https://usn.ubuntu.com/8094-1/","reference_id":"USN-8094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-1/"},{"reference_url":"https://usn.ubuntu.com/8094-2/","reference_id":"USN-8094-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-2/"},{"reference_url":"https://usn.ubuntu.com/8094-3/","reference_id":"USN-8094-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-3/"},{"reference_url":"https://usn.ubuntu.com/8094-4/","reference_id":"USN-8094-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-4/"},{"reference_url":"https://usn.ubuntu.com/8094-5/","reference_id":"USN-8094-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-5/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8096-1/","reference_id":"USN-8096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-1/"},{"reference_url":"https://usn.ubuntu.com/8096-2/","reference_id":"USN-8096-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-2/"},{"reference_url":"https://usn.ubuntu.com/8096-3/","reference_id":"USN-8096-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-3/"},{"reference_url":"https://usn.ubuntu.com/8096-4/","reference_id":"USN-8096-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-4/"},{"reference_url":"https://usn.ubuntu.com/8096-5/","reference_id":"USN-8096-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8116-1/","reference_id":"USN-8116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8116-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8152-1/","reference_id":"USN-8152-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8152-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"}],"fixed_packages":[],"aliases":["CVE-2025-68301"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qfge-zawt-qyb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65446?format=json","vulnerability_id":"VCID-vwpb-78dc-wuf7","summary":"kernel: tcp: fix a signed-integer-overflow bug in tcp_add_backlog()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50865.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50865.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50865","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07549","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07518","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426226","reference_id":"2426226","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1661","reference_id":"RHSA-2026:1661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1662","reference_id":"RHSA-2026:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1909","reference_id":"RHSA-2026:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1946","reference_id":"RHSA-2026:1946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2573","reference_id":"RHSA-2026:2573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2577","reference_id":"RHSA-2026:2577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3277","reference_id":"RHSA-2026:3277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3388","reference_id":"RHSA-2026:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3388"}],"fixed_packages":[],"aliases":["CVE-2022-50865"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vwpb-78dc-wuf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66238?format=json","vulnerability_id":"VCID-xhsu-dqfq-3fev","summary":"kernel: Linux kernel (CIFS): Use-after-free vulnerability allows data integrity compromise and denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53751.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53751.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53751","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09858","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10007","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10049","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10071","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10009","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53751"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419858","reference_id":"2419858","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19447","reference_id":"RHSA-2025:19447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1512","reference_id":"RHSA-2026:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1886","reference_id":"RHSA-2026:1886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1909","reference_id":"RHSA-2026:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1946","reference_id":"RHSA-2026:1946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2535","reference_id":"RHSA-2026:2535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2573","reference_id":"RHSA-2026:2573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2577","reference_id":"RHSA-2026:2577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2577"}],"fixed_packages":[],"aliases":["CVE-2023-53751"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xhsu-dqfq-3fev"}],"fixing_vulnerabilities":[],"risk_score":"3.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-284.155.1.rt14.440%3Farch=el9_2"}