Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/87800?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/87800?format=api", "purl": "pkg:rpm/redhat/kernel@5.14.0-570.84.1?arch=el9_6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "5.14.0-570.84.1", "qualifiers": { "arch": "el9_6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66371?format=api", "vulnerability_id": "VCID-enr2-4j6n-jqf7", "summary": "kernel: Linux kernel: vsock vulnerability may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40248.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40248.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40248", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12754", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1255", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12685", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16694", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21111", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21121", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21077", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21025", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21015", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20969", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21004", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20877", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20879", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20847", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.2105", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40248" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418872", "reference_id": "2418872", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1142", "reference_id": "RHSA-2026:1142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1143", "reference_id": "RHSA-2026:1143", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1143" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1148", "reference_id": "RHSA-2026:1148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1442", "reference_id": "RHSA-2026:1442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1442" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1445", "reference_id": "RHSA-2026:1445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1494", "reference_id": "RHSA-2026:1494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1495", "reference_id": "RHSA-2026:1495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1512", "reference_id": "RHSA-2026:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1581", "reference_id": "RHSA-2026:1581", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1581" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1623", "reference_id": "RHSA-2026:1623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1690", "reference_id": "RHSA-2026:1690", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1703", "reference_id": "RHSA-2026:1703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1727", "reference_id": "RHSA-2026:1727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1879", "reference_id": "RHSA-2026:1879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1879" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1886", "reference_id": "RHSA-2026:1886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1909", "reference_id": "RHSA-2026:1909", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1909" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1946", "reference_id": "RHSA-2026:1946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3848", "reference_id": "RHSA-2026:3848", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3848" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3865", "reference_id": "RHSA-2026:3865", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3865" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3866", "reference_id": "RHSA-2026:3866", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3866" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3867", "reference_id": "RHSA-2026:3867", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3867" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3868", "reference_id": "RHSA-2026:3868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3873", "reference_id": "RHSA-2026:3873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3886", "reference_id": "RHSA-2026:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3987", "reference_id": "RHSA-2026:3987", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3987" }, { "reference_url": "https://usn.ubuntu.com/8094-1/", "reference_id": "USN-8094-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-1/" }, { "reference_url": "https://usn.ubuntu.com/8094-2/", "reference_id": "USN-8094-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-2/" }, { "reference_url": "https://usn.ubuntu.com/8094-3/", "reference_id": "USN-8094-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-3/" }, { "reference_url": "https://usn.ubuntu.com/8094-4/", "reference_id": "USN-8094-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-4/" }, { "reference_url": "https://usn.ubuntu.com/8094-5/", "reference_id": "USN-8094-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-5/" }, { "reference_url": "https://usn.ubuntu.com/8095-1/", "reference_id": "USN-8095-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-2/", "reference_id": "USN-8095-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-2/" }, { "reference_url": "https://usn.ubuntu.com/8095-3/", "reference_id": "USN-8095-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-3/" }, { "reference_url": "https://usn.ubuntu.com/8095-4/", "reference_id": "USN-8095-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-4/" }, { "reference_url": "https://usn.ubuntu.com/8095-5/", "reference_id": "USN-8095-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-5/" }, { "reference_url": "https://usn.ubuntu.com/8096-1/", "reference_id": "USN-8096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-1/" }, { "reference_url": "https://usn.ubuntu.com/8096-2/", "reference_id": "USN-8096-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-2/" }, { "reference_url": "https://usn.ubuntu.com/8096-3/", "reference_id": "USN-8096-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-3/" }, { "reference_url": "https://usn.ubuntu.com/8096-4/", "reference_id": "USN-8096-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-4/" }, { "reference_url": "https://usn.ubuntu.com/8096-5/", "reference_id": "USN-8096-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-5/" }, { "reference_url": "https://usn.ubuntu.com/8100-1/", "reference_id": "USN-8100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8100-1/" }, { "reference_url": "https://usn.ubuntu.com/8116-1/", "reference_id": "USN-8116-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8116-1/" }, { "reference_url": "https://usn.ubuntu.com/8125-1/", "reference_id": "USN-8125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8125-1/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" }, { "reference_url": "https://usn.ubuntu.com/8141-1/", "reference_id": "USN-8141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8141-1/" }, { "reference_url": "https://usn.ubuntu.com/8152-1/", "reference_id": "USN-8152-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8152-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-1/", "reference_id": "USN-8163-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-2/", "reference_id": "USN-8163-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-2/" }, { "reference_url": "https://usn.ubuntu.com/8165-1/", "reference_id": "USN-8165-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8165-1/" }, { "reference_url": "https://usn.ubuntu.com/8243-1/", "reference_id": "USN-8243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8243-1/" }, { "reference_url": "https://usn.ubuntu.com/8261-1/", "reference_id": "USN-8261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8261-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-40248" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-enr2-4j6n-jqf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66039?format=api", "vulnerability_id": "VCID-qfge-zawt-qyb3", "summary": "kernel: net: atlantic: fix fragment overflow handling in RX path", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68301.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68301.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-68301", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16694", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16546", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16631", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16684", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16621", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16561", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16499", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20899", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21004", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20877", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20879", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20847", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20741", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20814", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-68301" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2422836", "reference_id": "2422836", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2422836" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0759", "reference_id": "RHSA-2026:0759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0760", "reference_id": "RHSA-2026:0760", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0760" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1143", "reference_id": "RHSA-2026:1143", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1143" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1690", "reference_id": "RHSA-2026:1690", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1703", "reference_id": "RHSA-2026:1703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1727", "reference_id": "RHSA-2026:1727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1879", "reference_id": "RHSA-2026:1879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1879" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1886", "reference_id": "RHSA-2026:1886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1909", "reference_id": "RHSA-2026:1909", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1909" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1946", "reference_id": "RHSA-2026:1946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2490", "reference_id": "RHSA-2026:2490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2535", "reference_id": "RHSA-2026:2535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2573", "reference_id": "RHSA-2026:2573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2577", "reference_id": "RHSA-2026:2577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2664", "reference_id": "RHSA-2026:2664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2664" }, { "reference_url": "https://usn.ubuntu.com/8094-1/", "reference_id": "USN-8094-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-1/" }, { "reference_url": "https://usn.ubuntu.com/8094-2/", "reference_id": "USN-8094-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-2/" }, { "reference_url": "https://usn.ubuntu.com/8094-3/", "reference_id": "USN-8094-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-3/" }, { "reference_url": "https://usn.ubuntu.com/8094-4/", "reference_id": "USN-8094-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-4/" }, { "reference_url": "https://usn.ubuntu.com/8094-5/", "reference_id": "USN-8094-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-5/" }, { "reference_url": "https://usn.ubuntu.com/8095-1/", "reference_id": "USN-8095-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-2/", "reference_id": "USN-8095-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-2/" }, { "reference_url": "https://usn.ubuntu.com/8095-3/", "reference_id": "USN-8095-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-3/" }, { "reference_url": "https://usn.ubuntu.com/8095-4/", "reference_id": "USN-8095-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-4/" }, { "reference_url": "https://usn.ubuntu.com/8095-5/", "reference_id": "USN-8095-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-5/" }, { "reference_url": "https://usn.ubuntu.com/8096-1/", "reference_id": "USN-8096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-1/" }, { "reference_url": "https://usn.ubuntu.com/8096-2/", "reference_id": "USN-8096-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-2/" }, { "reference_url": "https://usn.ubuntu.com/8096-3/", "reference_id": "USN-8096-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-3/" }, { "reference_url": "https://usn.ubuntu.com/8096-4/", "reference_id": "USN-8096-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-4/" }, { "reference_url": "https://usn.ubuntu.com/8096-5/", "reference_id": "USN-8096-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-5/" }, { "reference_url": "https://usn.ubuntu.com/8100-1/", "reference_id": "USN-8100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8100-1/" }, { "reference_url": "https://usn.ubuntu.com/8116-1/", "reference_id": "USN-8116-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8116-1/" }, { "reference_url": "https://usn.ubuntu.com/8125-1/", "reference_id": "USN-8125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8125-1/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" }, { "reference_url": "https://usn.ubuntu.com/8141-1/", "reference_id": "USN-8141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8141-1/" }, { "reference_url": "https://usn.ubuntu.com/8152-1/", "reference_id": "USN-8152-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8152-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-1/", "reference_id": "USN-8163-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-2/", "reference_id": "USN-8163-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-2/" }, { "reference_url": "https://usn.ubuntu.com/8165-1/", "reference_id": "USN-8165-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8165-1/" }, { "reference_url": "https://usn.ubuntu.com/8243-1/", "reference_id": "USN-8243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8243-1/" }, { "reference_url": "https://usn.ubuntu.com/8261-1/", "reference_id": "USN-8261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8261-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-68301" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qfge-zawt-qyb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70810?format=api", "vulnerability_id": "VCID-w8r5-decj-vkem", "summary": "kernel: io_uring: prevent opcode speculation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21863.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21863.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-21863", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02734", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02673", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02662", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0265", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02705", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02679", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02696", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12315", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12228", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12118", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12119", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12362", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12163", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12243", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12293", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12301", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12265", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-21863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21863" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/1e988c3fe1264708f4f92109203ac5b1d65de50b", "reference_id": "1e988c3fe1264708f4f92109203ac5b1d65de50b", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:25:38Z/" } ], "url": "https://git.kernel.org/stable/c/1e988c3fe1264708f4f92109203ac5b1d65de50b" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351629", "reference_id": "2351629", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351629" }, { "reference_url": "https://git.kernel.org/stable/c/506b9b5e8c2d2a411ea8fe361333f5081c56d23a", "reference_id": "506b9b5e8c2d2a411ea8fe361333f5081c56d23a", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:25:38Z/" } ], "url": "https://git.kernel.org/stable/c/506b9b5e8c2d2a411ea8fe361333f5081c56d23a" }, { "reference_url": "https://git.kernel.org/stable/c/b9826e3b26ec031e9063f64a7c735449c43955e4", "reference_id": "b9826e3b26ec031e9063f64a7c735449c43955e4", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:25:38Z/" } ], "url": "https://git.kernel.org/stable/c/b9826e3b26ec031e9063f64a7c735449c43955e4" }, { "reference_url": "https://git.kernel.org/stable/c/fdbfd52bd8b85ed6783365ff54c82ab7067bd61b", "reference_id": "fdbfd52bd8b85ed6783365ff54c82ab7067bd61b", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:25:38Z/" } ], "url": "https://git.kernel.org/stable/c/fdbfd52bd8b85ed6783365ff54c82ab7067bd61b" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20095", "reference_id": "RHSA-2025:20095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20095" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20518", "reference_id": "RHSA-2025:20518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1703", "reference_id": "RHSA-2026:1703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1703" }, { "reference_url": "https://usn.ubuntu.com/7521-1/", "reference_id": "USN-7521-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7521-1/" }, { "reference_url": "https://usn.ubuntu.com/7521-2/", "reference_id": "USN-7521-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7521-2/" }, { "reference_url": "https://usn.ubuntu.com/7521-3/", "reference_id": "USN-7521-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7521-3/" }, { "reference_url": "https://usn.ubuntu.com/7703-1/", "reference_id": "USN-7703-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7703-1/" }, { "reference_url": "https://usn.ubuntu.com/7703-2/", "reference_id": "USN-7703-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7703-2/" }, { "reference_url": "https://usn.ubuntu.com/7703-3/", "reference_id": "USN-7703-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7703-3/" }, { "reference_url": "https://usn.ubuntu.com/7703-4/", "reference_id": "USN-7703-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7703-4/" }, { "reference_url": "https://usn.ubuntu.com/7719-1/", "reference_id": "USN-7719-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7719-1/" }, { "reference_url": "https://usn.ubuntu.com/7737-1/", "reference_id": "USN-7737-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7737-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-21863" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w8r5-decj-vkem" } ], "fixing_vulnerabilities": [], "risk_score": "3.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-570.84.1%3Farch=el9_6" }