{"url":"http://public2.vulnerablecode.io/api/packages/87614?format=json","purl":"pkg:rpm/redhat/kernel@4.18.0-193.185.1?arch=el8_2","type":"rpm","namespace":"redhat","name":"kernel","version":"4.18.0-193.185.1","qualifiers":{"arch":"el8_2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67148?format=json","vulnerability_id":"VCID-676c-3wrp-1ufr","summary":"kernel: RDMA/rxe: Fix incomplete state save in rxe_requester","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53539.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53539.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53539","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0361","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04502","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04505","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.045","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53539"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401510","reference_id":"2401510","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22800","reference_id":"RHSA-2025:22800","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22800"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22801","reference_id":"RHSA-2025:22801","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22801"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0534","reference_id":"RHSA-2026:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0535","reference_id":"RHSA-2026:0535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10756","reference_id":"RHSA-2026:10756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1445","reference_id":"RHSA-2026:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1494","reference_id":"RHSA-2026:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1495","reference_id":"RHSA-2026:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2664","reference_id":"RHSA-2026:2664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5691","reference_id":"RHSA-2026:5691","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5691"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9870","reference_id":"RHSA-2026:9870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9870"}],"fixed_packages":[],"aliases":["CVE-2023-53539"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-676c-3wrp-1ufr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66268?format=json","vulnerability_id":"VCID-6wu1-5wuf-nyan","summary":"kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40322.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40322.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40322","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10636","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10643","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10705","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10564","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12982","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12894","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12966","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12956","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13585","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13451","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13446","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1352","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13528","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13501","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13393","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13296","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13537","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13621","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40322"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419902","reference_id":"2419902","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419902"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1661","reference_id":"RHSA-2026:1661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1662","reference_id":"RHSA-2026:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1727","reference_id":"RHSA-2026:1727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2282","reference_id":"RHSA-2026:2282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2352","reference_id":"RHSA-2026:2352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2535","reference_id":"RHSA-2026:2535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2560","reference_id":"RHSA-2026:2560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2573","reference_id":"RHSA-2026:2573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2577","reference_id":"RHSA-2026:2577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2583","reference_id":"RHSA-2026:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2594","reference_id":"RHSA-2026:2594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2664","reference_id":"RHSA-2026:2664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2722","reference_id":"RHSA-2026:2722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://usn.ubuntu.com/8029-1/","reference_id":"USN-8029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-1/"},{"reference_url":"https://usn.ubuntu.com/8029-2/","reference_id":"USN-8029-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-2/"},{"reference_url":"https://usn.ubuntu.com/8029-3/","reference_id":"USN-8029-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-3/"},{"reference_url":"https://usn.ubuntu.com/8030-1/","reference_id":"USN-8030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8030-1/"},{"reference_url":"https://usn.ubuntu.com/8048-1/","reference_id":"USN-8048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8048-1/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8096-1/","reference_id":"USN-8096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-1/"},{"reference_url":"https://usn.ubuntu.com/8096-2/","reference_id":"USN-8096-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-2/"},{"reference_url":"https://usn.ubuntu.com/8096-3/","reference_id":"USN-8096-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-3/"},{"reference_url":"https://usn.ubuntu.com/8096-4/","reference_id":"USN-8096-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-4/"},{"reference_url":"https://usn.ubuntu.com/8096-5/","reference_id":"USN-8096-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8116-1/","reference_id":"USN-8116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8116-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"}],"fixed_packages":[],"aliases":["CVE-2025-40322"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6wu1-5wuf-nyan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66172?format=json","vulnerability_id":"VCID-7qtt-szq5-huep","summary":"kernel: ext4: fix use-after-free in ext4_orphan_cleanup","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50673.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50673.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50673","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08281","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08268","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08253","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08616","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14384","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14454","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14487","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14383","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14549","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50673"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420347","reference_id":"2420347","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2264","reference_id":"RHSA-2026:2264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2264"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2378","reference_id":"RHSA-2026:2378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2573","reference_id":"RHSA-2026:2573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2577","reference_id":"RHSA-2026:2577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2664","reference_id":"RHSA-2026:2664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3267","reference_id":"RHSA-2026:3267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3277","reference_id":"RHSA-2026:3277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3358","reference_id":"RHSA-2026:3358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3358"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3634","reference_id":"RHSA-2026:3634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3685","reference_id":"RHSA-2026:3685","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3685"}],"fixed_packages":[],"aliases":["CVE-2022-50673"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7qtt-szq5-huep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66517?format=json","vulnerability_id":"VCID-9d3k-s661-nud4","summary":"kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40154.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40154.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40154","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13035","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12996","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1295","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12853","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12951","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17939","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18042","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18004","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18037","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17845","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18026","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1799","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21111","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21194","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2105","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40154"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414494","reference_id":"2414494","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0804","reference_id":"RHSA-2026:0804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0804"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0917","reference_id":"RHSA-2026:0917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0917"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1142","reference_id":"RHSA-2026:1142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1148","reference_id":"RHSA-2026:1148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1236","reference_id":"RHSA-2026:1236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1494","reference_id":"RHSA-2026:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1495","reference_id":"RHSA-2026:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1617","reference_id":"RHSA-2026:1617","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1617"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1690","reference_id":"RHSA-2026:1690","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1886","reference_id":"RHSA-2026:1886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2535","reference_id":"RHSA-2026:2535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2664","reference_id":"RHSA-2026:2664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2664"},{"reference_url":"https://usn.ubuntu.com/8029-1/","reference_id":"USN-8029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-1/"},{"reference_url":"https://usn.ubuntu.com/8029-2/","reference_id":"USN-8029-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-2/"},{"reference_url":"https://usn.ubuntu.com/8029-3/","reference_id":"USN-8029-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-3/"},{"reference_url":"https://usn.ubuntu.com/8030-1/","reference_id":"USN-8030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8030-1/"},{"reference_url":"https://usn.ubuntu.com/8033-1/","reference_id":"USN-8033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-1/"},{"reference_url":"https://usn.ubuntu.com/8033-2/","reference_id":"USN-8033-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-2/"},{"reference_url":"https://usn.ubuntu.com/8033-3/","reference_id":"USN-8033-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-3/"},{"reference_url":"https://usn.ubuntu.com/8033-4/","reference_id":"USN-8033-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-4/"},{"reference_url":"https://usn.ubuntu.com/8033-5/","reference_id":"USN-8033-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-5/"},{"reference_url":"https://usn.ubuntu.com/8033-6/","reference_id":"USN-8033-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-6/"},{"reference_url":"https://usn.ubuntu.com/8033-7/","reference_id":"USN-8033-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-7/"},{"reference_url":"https://usn.ubuntu.com/8033-8/","reference_id":"USN-8033-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-8/"},{"reference_url":"https://usn.ubuntu.com/8034-1/","reference_id":"USN-8034-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8034-1/"},{"reference_url":"https://usn.ubuntu.com/8034-2/","reference_id":"USN-8034-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8034-2/"},{"reference_url":"https://usn.ubuntu.com/8048-1/","reference_id":"USN-8048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8048-1/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"}],"fixed_packages":[],"aliases":["CVE-2025-40154"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9d3k-s661-nud4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66245?format=json","vulnerability_id":"VCID-gg4r-7tb8-rkha","summary":"kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40304.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40304.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40304","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12654","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12569","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12629","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12627","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16631","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21077","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21015","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21004","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20877","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20879","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20847","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21111","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21121","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40304"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419870","reference_id":"2419870","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1727","reference_id":"RHSA-2026:1727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2282","reference_id":"RHSA-2026:2282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2535","reference_id":"RHSA-2026:2535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2560","reference_id":"RHSA-2026:2560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2573","reference_id":"RHSA-2026:2573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2577","reference_id":"RHSA-2026:2577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2583","reference_id":"RHSA-2026:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2664","reference_id":"RHSA-2026:2664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2720","reference_id":"RHSA-2026:2720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2722","reference_id":"RHSA-2026:2722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2759","reference_id":"RHSA-2026:2759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2766","reference_id":"RHSA-2026:2766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2821","reference_id":"RHSA-2026:2821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://usn.ubuntu.com/8029-1/","reference_id":"USN-8029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-1/"},{"reference_url":"https://usn.ubuntu.com/8029-2/","reference_id":"USN-8029-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-2/"},{"reference_url":"https://usn.ubuntu.com/8029-3/","reference_id":"USN-8029-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-3/"},{"reference_url":"https://usn.ubuntu.com/8030-1/","reference_id":"USN-8030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8030-1/"},{"reference_url":"https://usn.ubuntu.com/8048-1/","reference_id":"USN-8048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8048-1/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8096-1/","reference_id":"USN-8096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-1/"},{"reference_url":"https://usn.ubuntu.com/8096-2/","reference_id":"USN-8096-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-2/"},{"reference_url":"https://usn.ubuntu.com/8096-3/","reference_id":"USN-8096-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-3/"},{"reference_url":"https://usn.ubuntu.com/8096-4/","reference_id":"USN-8096-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-4/"},{"reference_url":"https://usn.ubuntu.com/8096-5/","reference_id":"USN-8096-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8116-1/","reference_id":"USN-8116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8116-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"}],"fixed_packages":[],"aliases":["CVE-2025-40304"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gg4r-7tb8-rkha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66191?format=json","vulnerability_id":"VCID-h6rc-a42b-4yhq","summary":"kernel: drm/i915: Fix NULL ptr deref by checking new_crtc_state","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53833.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53833.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53833","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05741","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05724","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05735","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05921","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09144","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09273","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420366","reference_id":"2420366","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420366"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2535","reference_id":"RHSA-2026:2535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2560","reference_id":"RHSA-2026:2560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2573","reference_id":"RHSA-2026:2573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2577","reference_id":"RHSA-2026:2577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2583","reference_id":"RHSA-2026:2583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2664","reference_id":"RHSA-2026:2664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"}],"fixed_packages":[],"aliases":["CVE-2023-53833"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h6rc-a42b-4yhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67183?format=json","vulnerability_id":"VCID-nxkh-as3r-cufe","summary":"kernel: net/mlx5e: Check for NOT_READY flag state after locking","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53581.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53581.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53581","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0145","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0146","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01465","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01467","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01454","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01443","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01457","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01544","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01552","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0155","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0156","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02173","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0216","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02161","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02191","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02189","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53581"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401545","reference_id":"2401545","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1769","reference_id":"RHSA-2020:1769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3138","reference_id":"RHSA-2024:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0537","reference_id":"RHSA-2026:0537","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0576","reference_id":"RHSA-2026:0576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1445","reference_id":"RHSA-2026:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2664","reference_id":"RHSA-2026:2664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"}],"fixed_packages":[],"aliases":["CVE-2023-53581"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nxkh-as3r-cufe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65521?format=json","vulnerability_id":"VCID-qb49-dkqp-gbgw","summary":"kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68349.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68349.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68349","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16546","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16631","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16684","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16621","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16499","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16508","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16441","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20873","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20879","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20847","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20814","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20899","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20894","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68349"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68349","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68349"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424880","reference_id":"2424880","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2264","reference_id":"RHSA-2026:2264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2264"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2352","reference_id":"RHSA-2026:2352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2378","reference_id":"RHSA-2026:2378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2664","reference_id":"RHSA-2026:2664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2721","reference_id":"RHSA-2026:2721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2722","reference_id":"RHSA-2026:2722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2766","reference_id":"RHSA-2026:2766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3267","reference_id":"RHSA-2026:3267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3277","reference_id":"RHSA-2026:3277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3293","reference_id":"RHSA-2026:3293","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3358","reference_id":"RHSA-2026:3358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3358"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3375","reference_id":"RHSA-2026:3375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3634","reference_id":"RHSA-2026:3634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3685","reference_id":"RHSA-2026:3685","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3685"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6193","reference_id":"RHSA-2026:6193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6193"},{"reference_url":"https://usn.ubuntu.com/8094-1/","reference_id":"USN-8094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-1/"},{"reference_url":"https://usn.ubuntu.com/8094-2/","reference_id":"USN-8094-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-2/"},{"reference_url":"https://usn.ubuntu.com/8094-3/","reference_id":"USN-8094-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-3/"},{"reference_url":"https://usn.ubuntu.com/8094-4/","reference_id":"USN-8094-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-4/"},{"reference_url":"https://usn.ubuntu.com/8094-5/","reference_id":"USN-8094-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-5/"},{"reference_url":"https://usn.ubuntu.com/8096-1/","reference_id":"USN-8096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-1/"},{"reference_url":"https://usn.ubuntu.com/8096-2/","reference_id":"USN-8096-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-2/"},{"reference_url":"https://usn.ubuntu.com/8096-3/","reference_id":"USN-8096-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-3/"},{"reference_url":"https://usn.ubuntu.com/8096-4/","reference_id":"USN-8096-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-4/"},{"reference_url":"https://usn.ubuntu.com/8096-5/","reference_id":"USN-8096-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-5/"},{"reference_url":"https://usn.ubuntu.com/8116-1/","reference_id":"USN-8116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8116-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8152-1/","reference_id":"USN-8152-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8152-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8179-1/","reference_id":"USN-8179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-1/"},{"reference_url":"https://usn.ubuntu.com/8179-2/","reference_id":"USN-8179-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-2/"},{"reference_url":"https://usn.ubuntu.com/8179-3/","reference_id":"USN-8179-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-3/"},{"reference_url":"https://usn.ubuntu.com/8179-4/","reference_id":"USN-8179-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8179-4/"},{"reference_url":"https://usn.ubuntu.com/8184-1/","reference_id":"USN-8184-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8184-1/"},{"reference_url":"https://usn.ubuntu.com/8185-1/","reference_id":"USN-8185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8185-1/"},{"reference_url":"https://usn.ubuntu.com/8185-2/","reference_id":"USN-8185-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8185-2/"},{"reference_url":"https://usn.ubuntu.com/8203-1/","reference_id":"USN-8203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8203-1/"},{"reference_url":"https://usn.ubuntu.com/8204-1/","reference_id":"USN-8204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8204-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8258-1/","reference_id":"USN-8258-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8258-1/"},{"reference_url":"https://usn.ubuntu.com/8260-1/","reference_id":"USN-8260-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8260-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"},{"reference_url":"https://usn.ubuntu.com/8265-1/","reference_id":"USN-8265-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8265-1/"}],"fixed_packages":[],"aliases":["CVE-2025-68349"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qb49-dkqp-gbgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66039?format=json","vulnerability_id":"VCID-qfge-zawt-qyb3","summary":"kernel: net: atlantic: fix fragment overflow handling in RX path","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68301.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68301.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68301","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16631","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16684","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16621","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16499","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20894","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21004","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20877","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20879","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20847","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20814","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20899","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20873","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2422836","reference_id":"2422836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2422836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0759","reference_id":"RHSA-2026:0759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0760","reference_id":"RHSA-2026:0760","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0760"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1143","reference_id":"RHSA-2026:1143","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1143"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1690","reference_id":"RHSA-2026:1690","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1703","reference_id":"RHSA-2026:1703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1727","reference_id":"RHSA-2026:1727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1879","reference_id":"RHSA-2026:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1886","reference_id":"RHSA-2026:1886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1909","reference_id":"RHSA-2026:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1946","reference_id":"RHSA-2026:1946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2535","reference_id":"RHSA-2026:2535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2573","reference_id":"RHSA-2026:2573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2577","reference_id":"RHSA-2026:2577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2664","reference_id":"RHSA-2026:2664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2664"},{"reference_url":"https://usn.ubuntu.com/8094-1/","reference_id":"USN-8094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-1/"},{"reference_url":"https://usn.ubuntu.com/8094-2/","reference_id":"USN-8094-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-2/"},{"reference_url":"https://usn.ubuntu.com/8094-3/","reference_id":"USN-8094-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-3/"},{"reference_url":"https://usn.ubuntu.com/8094-4/","reference_id":"USN-8094-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-4/"},{"reference_url":"https://usn.ubuntu.com/8094-5/","reference_id":"USN-8094-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8094-5/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8096-1/","reference_id":"USN-8096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-1/"},{"reference_url":"https://usn.ubuntu.com/8096-2/","reference_id":"USN-8096-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-2/"},{"reference_url":"https://usn.ubuntu.com/8096-3/","reference_id":"USN-8096-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-3/"},{"reference_url":"https://usn.ubuntu.com/8096-4/","reference_id":"USN-8096-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-4/"},{"reference_url":"https://usn.ubuntu.com/8096-5/","reference_id":"USN-8096-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8116-1/","reference_id":"USN-8116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8116-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8152-1/","reference_id":"USN-8152-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8152-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"}],"fixed_packages":[],"aliases":["CVE-2025-68301"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qfge-zawt-qyb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67776?format=json","vulnerability_id":"VCID-y95w-zxcq-xqes","summary":"kernel: cifs: fix oops during encryption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50341.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50341.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50341","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01064","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01072","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01067","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01074","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01079","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01078","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01063","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01026","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01029","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01086","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.0109","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01091","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01087","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50341"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395879","reference_id":"2395879","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395879"},{"reference_url":"https://git.kernel.org/stable/c/a13e51760703f71c25d5fc1f4a62dfa4b0cc80e9","reference_id":"a13e51760703f71c25d5fc1f4a62dfa4b0cc80e9","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:19:48Z/"}],"url":"https://git.kernel.org/stable/c/a13e51760703f71c25d5fc1f4a62dfa4b0cc80e9"},{"reference_url":"https://git.kernel.org/stable/c/bf0543b93740916ee91956f9a63da6fc0d79daaa","reference_id":"bf0543b93740916ee91956f9a63da6fc0d79daaa","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:19:48Z/"}],"url":"https://git.kernel.org/stable/c/bf0543b93740916ee91956f9a63da6fc0d79daaa"},{"reference_url":"https://git.kernel.org/stable/c/e8d16a54842d609fd4a3ed2d81d4333d6329aa94","reference_id":"e8d16a54842d609fd4a3ed2d81d4333d6329aa94","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:19:48Z/"}],"url":"https://git.kernel.org/stable/c/e8d16a54842d609fd4a3ed2d81d4333d6329aa94"},{"reference_url":"https://git.kernel.org/stable/c/e8e2861cc3258dbe407d01ea8c59bb5a53132301","reference_id":"e8e2861cc3258dbe407d01ea8c59bb5a53132301","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:19:48Z/"}],"url":"https://git.kernel.org/stable/c/e8e2861cc3258dbe407d01ea8c59bb5a53132301"},{"reference_url":"https://git.kernel.org/stable/c/f7f291e14dde32a07b1f0aa06921d28f875a7b54","reference_id":"f7f291e14dde32a07b1f0aa06921d28f875a7b54","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:19:48Z/"}],"url":"https://git.kernel.org/stable/c/f7f291e14dde32a07b1f0aa06921d28f875a7b54"},{"reference_url":"https://git.kernel.org/stable/c/fe6ea044c4f05706cb71040055b1c70c6c8275e0","reference_id":"fe6ea044c4f05706cb71040055b1c70c6c8275e0","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:19:48Z/"}],"url":"https://git.kernel.org/stable/c/fe6ea044c4f05706cb71040055b1c70c6c8275e0"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10772","reference_id":"RHSA-2024:10772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8856","reference_id":"RHSA-2024:8856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8856"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22006","reference_id":"RHSA-2025:22006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22066","reference_id":"RHSA-2025:22066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22072","reference_id":"RHSA-2025:22072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22087","reference_id":"RHSA-2025:22087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22087"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22910","reference_id":"RHSA-2025:22910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22914","reference_id":"RHSA-2025:22914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1886","reference_id":"RHSA-2026:1886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2664","reference_id":"RHSA-2026:2664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2664"}],"fixed_packages":[],"aliases":["CVE-2022-50341"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y95w-zxcq-xqes"}],"fixing_vulnerabilities":[],"risk_score":"3.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-193.185.1%3Farch=el8_2"}