{"url":"http://public2.vulnerablecode.io/api/packages/87869?format=json","purl":"pkg:rpm/redhat/kernel-rt@5.14.0-284.154.1.rt14.439?arch=el9_2","type":"rpm","namespace":"redhat","name":"kernel-rt","version":"5.14.0-284.154.1.rt14.439","qualifiers":{"arch":"el9_2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66545?format=json","vulnerability_id":"VCID-2a25-xxe2-4bf3","summary":"kernel: Bluetooth: ISO: Fix possible UAF on iso_conn_free","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40141.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40141.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40141","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05847","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05864","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05854","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05812","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05821","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05975","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06277","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08317","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08459","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08364","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1024","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10137","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10212","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10275","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40141"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414522","reference_id":"2414522","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0489","reference_id":"RHSA-2026:0489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0747","reference_id":"RHSA-2026:0747","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0747"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1194","reference_id":"RHSA-2026:1194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2212","reference_id":"RHSA-2026:2212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2212"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2721","reference_id":"RHSA-2026:2721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2721"},{"reference_url":"https://usn.ubuntu.com/8029-1/","reference_id":"USN-8029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-1/"},{"reference_url":"https://usn.ubuntu.com/8029-2/","reference_id":"USN-8029-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-2/"},{"reference_url":"https://usn.ubuntu.com/8029-3/","reference_id":"USN-8029-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-3/"},{"reference_url":"https://usn.ubuntu.com/8030-1/","reference_id":"USN-8030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8030-1/"},{"reference_url":"https://usn.ubuntu.com/8048-1/","reference_id":"USN-8048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8048-1/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"}],"fixed_packages":[],"aliases":["CVE-2025-40141"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2a25-xxe2-4bf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67970?format=json","vulnerability_id":"VCID-4mx9-6gnz-bqbz","summary":"kernel: xsk: check IFF_UP earlier in Tx path","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53240.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53240.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53240","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03638","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03688","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03654","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03667","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04329","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04185","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04312","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04349","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04384","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04374","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04399","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04245","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0423","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04207","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04176","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53240"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/1596dae2f17ec5c6e8c8f0e3fec78c5ae55c1e0b","reference_id":"1596dae2f17ec5c6e8c8f0e3fec78c5ae55c1e0b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:57:36Z/"}],"url":"https://git.kernel.org/stable/c/1596dae2f17ec5c6e8c8f0e3fec78c5ae55c1e0b"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395413","reference_id":"2395413","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395413"},{"reference_url":"https://git.kernel.org/stable/c/cecc68559cd57fffb2be50685f262b9af2318e16","reference_id":"cecc68559cd57fffb2be50685f262b9af2318e16","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:57:36Z/"}],"url":"https://git.kernel.org/stable/c/cecc68559cd57fffb2be50685f262b9af2318e16"},{"reference_url":"https://git.kernel.org/stable/c/ffe19750e68d0bb21e8110b398346eef20b156a7","reference_id":"ffe19750e68d0bb21e8110b398346eef20b156a7","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:57:36Z/"}],"url":"https://git.kernel.org/stable/c/ffe19750e68d0bb21e8110b398346eef20b156a7"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"}],"fixed_packages":[],"aliases":["CVE-2023-53240"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4mx9-6gnz-bqbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66322?format=json","vulnerability_id":"VCID-7cxt-kddr-tybw","summary":"kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40277.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40277.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40277","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18663","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18579","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21111","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21121","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21077","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21015","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21004","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20877","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20879","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20847","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2105","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40277"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419954","reference_id":"2419954","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0453","reference_id":"RHSA-2026:0453","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0453"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0793","reference_id":"RHSA-2026:0793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0917","reference_id":"RHSA-2026:0917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0917"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1142","reference_id":"RHSA-2026:1142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1148","reference_id":"RHSA-2026:1148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1194","reference_id":"RHSA-2026:1194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1236","reference_id":"RHSA-2026:1236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1442","reference_id":"RHSA-2026:1442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1445","reference_id":"RHSA-2026:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1494","reference_id":"RHSA-2026:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1495","reference_id":"RHSA-2026:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1512","reference_id":"RHSA-2026:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1886","reference_id":"RHSA-2026:1886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1886"},{"reference_url":"https://usn.ubuntu.com/8029-1/","reference_id":"USN-8029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-1/"},{"reference_url":"https://usn.ubuntu.com/8029-2/","reference_id":"USN-8029-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-2/"},{"reference_url":"https://usn.ubuntu.com/8029-3/","reference_id":"USN-8029-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-3/"},{"reference_url":"https://usn.ubuntu.com/8030-1/","reference_id":"USN-8030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8030-1/"},{"reference_url":"https://usn.ubuntu.com/8048-1/","reference_id":"USN-8048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8048-1/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8096-1/","reference_id":"USN-8096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-1/"},{"reference_url":"https://usn.ubuntu.com/8096-2/","reference_id":"USN-8096-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-2/"},{"reference_url":"https://usn.ubuntu.com/8096-3/","reference_id":"USN-8096-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-3/"},{"reference_url":"https://usn.ubuntu.com/8096-4/","reference_id":"USN-8096-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-4/"},{"reference_url":"https://usn.ubuntu.com/8096-5/","reference_id":"USN-8096-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8116-1/","reference_id":"USN-8116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8116-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"}],"fixed_packages":[],"aliases":["CVE-2025-40277"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7cxt-kddr-tybw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66517?format=json","vulnerability_id":"VCID-9d3k-s661-nud4","summary":"kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40154.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40154.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40154","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1295","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13035","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12996","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12853","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12951","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18026","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1799","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17845","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17939","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21194","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2105","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21111","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40154"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414494","reference_id":"2414494","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0804","reference_id":"RHSA-2026:0804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0804"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0917","reference_id":"RHSA-2026:0917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0917"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1142","reference_id":"RHSA-2026:1142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1148","reference_id":"RHSA-2026:1148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1236","reference_id":"RHSA-2026:1236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1494","reference_id":"RHSA-2026:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1495","reference_id":"RHSA-2026:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1617","reference_id":"RHSA-2026:1617","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1617"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1690","reference_id":"RHSA-2026:1690","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1886","reference_id":"RHSA-2026:1886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2535","reference_id":"RHSA-2026:2535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2664","reference_id":"RHSA-2026:2664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2664"},{"reference_url":"https://usn.ubuntu.com/8029-1/","reference_id":"USN-8029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-1/"},{"reference_url":"https://usn.ubuntu.com/8029-2/","reference_id":"USN-8029-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-2/"},{"reference_url":"https://usn.ubuntu.com/8029-3/","reference_id":"USN-8029-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8029-3/"},{"reference_url":"https://usn.ubuntu.com/8030-1/","reference_id":"USN-8030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8030-1/"},{"reference_url":"https://usn.ubuntu.com/8033-1/","reference_id":"USN-8033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-1/"},{"reference_url":"https://usn.ubuntu.com/8033-2/","reference_id":"USN-8033-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-2/"},{"reference_url":"https://usn.ubuntu.com/8033-3/","reference_id":"USN-8033-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-3/"},{"reference_url":"https://usn.ubuntu.com/8033-4/","reference_id":"USN-8033-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-4/"},{"reference_url":"https://usn.ubuntu.com/8033-5/","reference_id":"USN-8033-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-5/"},{"reference_url":"https://usn.ubuntu.com/8033-6/","reference_id":"USN-8033-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-6/"},{"reference_url":"https://usn.ubuntu.com/8033-7/","reference_id":"USN-8033-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-7/"},{"reference_url":"https://usn.ubuntu.com/8033-8/","reference_id":"USN-8033-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-8/"},{"reference_url":"https://usn.ubuntu.com/8034-1/","reference_id":"USN-8034-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8034-1/"},{"reference_url":"https://usn.ubuntu.com/8034-2/","reference_id":"USN-8034-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8034-2/"},{"reference_url":"https://usn.ubuntu.com/8048-1/","reference_id":"USN-8048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8048-1/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"}],"fixed_packages":[],"aliases":["CVE-2025-40154"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9d3k-s661-nud4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66886?format=json","vulnerability_id":"VCID-as4s-97zw-x3bz","summary":"kernel: i40e: fix idx validation in config queues msg","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39971.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39971.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-39971","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18349","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18404","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18192","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18246","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18201","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1815","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18095","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18107","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18137","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1805","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18026","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1799","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17845","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17939","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-39971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39971"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2404108","reference_id":"2404108","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2404108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21469","reference_id":"RHSA-2025:21469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21917","reference_id":"RHSA-2025:21917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21917"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21920","reference_id":"RHSA-2025:21920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21933","reference_id":"RHSA-2025:21933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22395","reference_id":"RHSA-2025:22395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22571","reference_id":"RHSA-2025:22571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0173","reference_id":"RHSA-2026:0173","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0173"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0536","reference_id":"RHSA-2026:0536","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0536"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0643","reference_id":"RHSA-2026:0643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1445","reference_id":"RHSA-2026:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1494","reference_id":"RHSA-2026:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1495","reference_id":"RHSA-2026:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1581","reference_id":"RHSA-2026:1581","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1581"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1623","reference_id":"RHSA-2026:1623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1886","reference_id":"RHSA-2026:1886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1886"},{"reference_url":"https://usn.ubuntu.com/8033-1/","reference_id":"USN-8033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-1/"},{"reference_url":"https://usn.ubuntu.com/8033-2/","reference_id":"USN-8033-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-2/"},{"reference_url":"https://usn.ubuntu.com/8033-3/","reference_id":"USN-8033-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-3/"},{"reference_url":"https://usn.ubuntu.com/8033-4/","reference_id":"USN-8033-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-4/"},{"reference_url":"https://usn.ubuntu.com/8033-5/","reference_id":"USN-8033-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-5/"},{"reference_url":"https://usn.ubuntu.com/8033-6/","reference_id":"USN-8033-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-6/"},{"reference_url":"https://usn.ubuntu.com/8033-7/","reference_id":"USN-8033-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-7/"},{"reference_url":"https://usn.ubuntu.com/8033-8/","reference_id":"USN-8033-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8033-8/"},{"reference_url":"https://usn.ubuntu.com/8034-1/","reference_id":"USN-8034-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8034-1/"},{"reference_url":"https://usn.ubuntu.com/8034-2/","reference_id":"USN-8034-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8034-2/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"}],"fixed_packages":[],"aliases":["CVE-2025-39971"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-as4s-97zw-x3bz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69949?format=json","vulnerability_id":"VCID-hqpz-xjuf-vfa8","summary":"kernel: Linux kernel (openvswitch): Denial of Service and limited data exposure via improper key length validation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-37789.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-37789.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-37789","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20977","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.21035","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20828","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20889","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20904","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20861","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20799","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20791","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20776","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20658","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20654","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2062","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20514","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20585","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-37789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37789"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363315","reference_id":"2363315","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363315"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1194","reference_id":"RHSA-2026:1194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1236","reference_id":"RHSA-2026:1236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1444","reference_id":"RHSA-2026:1444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1494","reference_id":"RHSA-2026:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1495","reference_id":"RHSA-2026:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2212","reference_id":"RHSA-2026:2212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2212"},{"reference_url":"https://usn.ubuntu.com/7594-1/","reference_id":"USN-7594-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-1/"},{"reference_url":"https://usn.ubuntu.com/7594-2/","reference_id":"USN-7594-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-2/"},{"reference_url":"https://usn.ubuntu.com/7594-3/","reference_id":"USN-7594-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-3/"},{"reference_url":"https://usn.ubuntu.com/7654-1/","reference_id":"USN-7654-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-1/"},{"reference_url":"https://usn.ubuntu.com/7654-2/","reference_id":"USN-7654-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-2/"},{"reference_url":"https://usn.ubuntu.com/7654-3/","reference_id":"USN-7654-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-3/"},{"reference_url":"https://usn.ubuntu.com/7654-4/","reference_id":"USN-7654-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-4/"},{"reference_url":"https://usn.ubuntu.com/7654-5/","reference_id":"USN-7654-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-5/"},{"reference_url":"https://usn.ubuntu.com/7655-1/","reference_id":"USN-7655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7655-1/"},{"reference_url":"https://usn.ubuntu.com/7686-1/","reference_id":"USN-7686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7686-1/"},{"reference_url":"https://usn.ubuntu.com/7711-1/","reference_id":"USN-7711-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7711-1/"},{"reference_url":"https://usn.ubuntu.com/7712-1/","reference_id":"USN-7712-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7712-1/"},{"reference_url":"https://usn.ubuntu.com/7712-2/","reference_id":"USN-7712-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7712-2/"},{"reference_url":"https://usn.ubuntu.com/8028-1/","reference_id":"USN-8028-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-1/"},{"reference_url":"https://usn.ubuntu.com/8028-2/","reference_id":"USN-8028-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-2/"},{"reference_url":"https://usn.ubuntu.com/8028-3/","reference_id":"USN-8028-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-3/"},{"reference_url":"https://usn.ubuntu.com/8028-4/","reference_id":"USN-8028-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-4/"},{"reference_url":"https://usn.ubuntu.com/8028-5/","reference_id":"USN-8028-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-5/"},{"reference_url":"https://usn.ubuntu.com/8028-6/","reference_id":"USN-8028-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-6/"},{"reference_url":"https://usn.ubuntu.com/8028-7/","reference_id":"USN-8028-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-7/"},{"reference_url":"https://usn.ubuntu.com/8028-8/","reference_id":"USN-8028-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-8/"},{"reference_url":"https://usn.ubuntu.com/8031-1/","reference_id":"USN-8031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-1/"},{"reference_url":"https://usn.ubuntu.com/8031-2/","reference_id":"USN-8031-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-2/"},{"reference_url":"https://usn.ubuntu.com/8031-3/","reference_id":"USN-8031-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-3/"},{"reference_url":"https://usn.ubuntu.com/8052-1/","reference_id":"USN-8052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-1/"},{"reference_url":"https://usn.ubuntu.com/8052-2/","reference_id":"USN-8052-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-2/"},{"reference_url":"https://usn.ubuntu.com/8074-1/","reference_id":"USN-8074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-1/"},{"reference_url":"https://usn.ubuntu.com/8074-2/","reference_id":"USN-8074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-2/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"}],"fixed_packages":[],"aliases":["CVE-2025-37789"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hqpz-xjuf-vfa8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67183?format=json","vulnerability_id":"VCID-nxkh-as3r-cufe","summary":"kernel: net/mlx5e: Check for NOT_READY flag state after locking","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53581.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53581.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53581","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0145","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0146","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01465","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01467","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01454","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01443","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01552","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0155","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0156","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01457","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01544","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02161","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0216","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53581"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401545","reference_id":"2401545","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1769","reference_id":"RHSA-2020:1769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3138","reference_id":"RHSA-2024:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0537","reference_id":"RHSA-2026:0537","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0576","reference_id":"RHSA-2026:0576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1445","reference_id":"RHSA-2026:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2490","reference_id":"RHSA-2026:2490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2664","reference_id":"RHSA-2026:2664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3360","reference_id":"RHSA-2026:3360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3360"}],"fixed_packages":[],"aliases":["CVE-2023-53581"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nxkh-as3r-cufe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69718?format=json","vulnerability_id":"VCID-p64n-3pb8-rfgs","summary":"kernel: KVM: arm64: Tear down vGIC on failed vCPU creation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-37849.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-37849.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-37849","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1708","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17319","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1726","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17265","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16988","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17479","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17259","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1735","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1741","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17422","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17374","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18196","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17998","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17905","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17881","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-37849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37849"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2365271","reference_id":"2365271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2365271"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20095","reference_id":"RHSA-2025:20095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20518","reference_id":"RHSA-2025:20518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0804","reference_id":"RHSA-2026:0804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0804"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0917","reference_id":"RHSA-2026:0917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0917"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1494","reference_id":"RHSA-2026:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1495","reference_id":"RHSA-2026:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6193","reference_id":"RHSA-2026:6193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6193"},{"reference_url":"https://usn.ubuntu.com/7594-1/","reference_id":"USN-7594-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-1/"},{"reference_url":"https://usn.ubuntu.com/7594-2/","reference_id":"USN-7594-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-2/"},{"reference_url":"https://usn.ubuntu.com/7594-3/","reference_id":"USN-7594-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-3/"},{"reference_url":"https://usn.ubuntu.com/8028-1/","reference_id":"USN-8028-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-1/"},{"reference_url":"https://usn.ubuntu.com/8028-2/","reference_id":"USN-8028-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-2/"},{"reference_url":"https://usn.ubuntu.com/8028-3/","reference_id":"USN-8028-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-3/"},{"reference_url":"https://usn.ubuntu.com/8028-4/","reference_id":"USN-8028-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-4/"},{"reference_url":"https://usn.ubuntu.com/8028-5/","reference_id":"USN-8028-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-5/"},{"reference_url":"https://usn.ubuntu.com/8028-6/","reference_id":"USN-8028-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-6/"},{"reference_url":"https://usn.ubuntu.com/8028-7/","reference_id":"USN-8028-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-7/"},{"reference_url":"https://usn.ubuntu.com/8028-8/","reference_id":"USN-8028-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-8/"},{"reference_url":"https://usn.ubuntu.com/8031-1/","reference_id":"USN-8031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-1/"},{"reference_url":"https://usn.ubuntu.com/8031-2/","reference_id":"USN-8031-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-2/"},{"reference_url":"https://usn.ubuntu.com/8031-3/","reference_id":"USN-8031-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-3/"},{"reference_url":"https://usn.ubuntu.com/8052-1/","reference_id":"USN-8052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-1/"},{"reference_url":"https://usn.ubuntu.com/8052-2/","reference_id":"USN-8052-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-2/"},{"reference_url":"https://usn.ubuntu.com/8074-1/","reference_id":"USN-8074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-1/"},{"reference_url":"https://usn.ubuntu.com/8074-2/","reference_id":"USN-8074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-2/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8145-1/","reference_id":"USN-8145-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8145-1/"},{"reference_url":"https://usn.ubuntu.com/8145-2/","reference_id":"USN-8145-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8145-2/"},{"reference_url":"https://usn.ubuntu.com/8145-3/","reference_id":"USN-8145-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8145-3/"},{"reference_url":"https://usn.ubuntu.com/8145-4/","reference_id":"USN-8145-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8145-4/"},{"reference_url":"https://usn.ubuntu.com/8145-5/","reference_id":"USN-8145-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8145-5/"},{"reference_url":"https://usn.ubuntu.com/8159-1/","reference_id":"USN-8159-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8159-1/"},{"reference_url":"https://usn.ubuntu.com/8159-2/","reference_id":"USN-8159-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8159-2/"},{"reference_url":"https://usn.ubuntu.com/8159-3/","reference_id":"USN-8159-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8159-3/"},{"reference_url":"https://usn.ubuntu.com/8162-1/","reference_id":"USN-8162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8162-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8164-1/","reference_id":"USN-8164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8164-1/"},{"reference_url":"https://usn.ubuntu.com/8188-1/","reference_id":"USN-8188-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8188-1/"},{"reference_url":"https://usn.ubuntu.com/8200-1/","reference_id":"USN-8200-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8200-1/"},{"reference_url":"https://usn.ubuntu.com/8200-2/","reference_id":"USN-8200-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8200-2/"},{"reference_url":"https://usn.ubuntu.com/8201-1/","reference_id":"USN-8201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8201-1/"},{"reference_url":"https://usn.ubuntu.com/8224-1/","reference_id":"USN-8224-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8224-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"}],"fixed_packages":[],"aliases":["CVE-2025-37849"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p64n-3pb8-rfgs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67152?format=json","vulnerability_id":"VCID-qpq9-r7ew-qbg3","summary":"kernel: drm/i915: mark requests for GuC virtual engines to avoid use-after-free","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53552.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53552.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53552","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01937","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01936","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0195","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01935","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01919","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01914","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01967","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01964","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01993","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01895","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01893","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01981","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0273","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02746","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53552"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401514","reference_id":"2401514","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0759","reference_id":"RHSA-2026:0759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0760","reference_id":"RHSA-2026:0760","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0760"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1445","reference_id":"RHSA-2026:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1445"}],"fixed_packages":[],"aliases":["CVE-2023-53552"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qpq9-r7ew-qbg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67228?format=json","vulnerability_id":"VCID-s515-9fmf-zqcu","summary":"kernel: e1000e: fix heap overflow in e1000_set_eeprom","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39898.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39898.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400598","reference_id":"2400598","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21933","reference_id":"RHSA-2025:21933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22387","reference_id":"RHSA-2025:22387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22388","reference_id":"RHSA-2025:22388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22395","reference_id":"RHSA-2025:22395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22405","reference_id":"RHSA-2025:22405","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22405"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22571","reference_id":"RHSA-2025:22571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0489","reference_id":"RHSA-2026:0489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0533","reference_id":"RHSA-2026:0533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0536","reference_id":"RHSA-2026:0536","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0536"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1445","reference_id":"RHSA-2026:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1512","reference_id":"RHSA-2026:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1581","reference_id":"RHSA-2026:1581","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1581"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1623","reference_id":"RHSA-2026:1623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1623"}],"fixed_packages":[],"aliases":["CVE-2025-39898"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s515-9fmf-zqcu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70284?format=json","vulnerability_id":"VCID-te8s-rb5h-87fd","summary":"kernel: Linux kernel: Information disclosure and denial of service in ntb_hw_switchtec module","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53034.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53034.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53034","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23401","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23227","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.233","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2335","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2337","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23332","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23276","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23293","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23287","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23269","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23078","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23072","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23065","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22956","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23039","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53034"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2360239","reference_id":"2360239","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2360239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1194","reference_id":"RHSA-2026:1194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1444","reference_id":"RHSA-2026:1444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1494","reference_id":"RHSA-2026:1494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1495","reference_id":"RHSA-2026:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1727","reference_id":"RHSA-2026:1727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2721","reference_id":"RHSA-2026:2721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2722","reference_id":"RHSA-2026:2722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2722"},{"reference_url":"https://usn.ubuntu.com/7585-1/","reference_id":"USN-7585-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-1/"},{"reference_url":"https://usn.ubuntu.com/7585-2/","reference_id":"USN-7585-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-2/"},{"reference_url":"https://usn.ubuntu.com/7585-3/","reference_id":"USN-7585-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-3/"},{"reference_url":"https://usn.ubuntu.com/7585-4/","reference_id":"USN-7585-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-4/"},{"reference_url":"https://usn.ubuntu.com/7585-5/","reference_id":"USN-7585-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-5/"},{"reference_url":"https://usn.ubuntu.com/7585-6/","reference_id":"USN-7585-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-6/"},{"reference_url":"https://usn.ubuntu.com/7585-7/","reference_id":"USN-7585-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-7/"},{"reference_url":"https://usn.ubuntu.com/7591-1/","reference_id":"USN-7591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-1/"},{"reference_url":"https://usn.ubuntu.com/7591-2/","reference_id":"USN-7591-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-2/"},{"reference_url":"https://usn.ubuntu.com/7591-3/","reference_id":"USN-7591-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-3/"},{"reference_url":"https://usn.ubuntu.com/7591-4/","reference_id":"USN-7591-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-4/"},{"reference_url":"https://usn.ubuntu.com/7591-5/","reference_id":"USN-7591-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-5/"},{"reference_url":"https://usn.ubuntu.com/7591-6/","reference_id":"USN-7591-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-6/"},{"reference_url":"https://usn.ubuntu.com/7592-1/","reference_id":"USN-7592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7592-1/"},{"reference_url":"https://usn.ubuntu.com/7593-1/","reference_id":"USN-7593-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7593-1/"},{"reference_url":"https://usn.ubuntu.com/7594-1/","reference_id":"USN-7594-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-1/"},{"reference_url":"https://usn.ubuntu.com/7594-2/","reference_id":"USN-7594-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-2/"},{"reference_url":"https://usn.ubuntu.com/7594-3/","reference_id":"USN-7594-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-3/"},{"reference_url":"https://usn.ubuntu.com/7597-1/","reference_id":"USN-7597-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7597-1/"},{"reference_url":"https://usn.ubuntu.com/7597-2/","reference_id":"USN-7597-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7597-2/"},{"reference_url":"https://usn.ubuntu.com/7598-1/","reference_id":"USN-7598-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7598-1/"},{"reference_url":"https://usn.ubuntu.com/7602-1/","reference_id":"USN-7602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7602-1/"},{"reference_url":"https://usn.ubuntu.com/7605-1/","reference_id":"USN-7605-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7605-1/"},{"reference_url":"https://usn.ubuntu.com/7605-2/","reference_id":"USN-7605-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7605-2/"},{"reference_url":"https://usn.ubuntu.com/7606-1/","reference_id":"USN-7606-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7606-1/"},{"reference_url":"https://usn.ubuntu.com/7628-1/","reference_id":"USN-7628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7628-1/"},{"reference_url":"https://usn.ubuntu.com/7640-1/","reference_id":"USN-7640-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7640-1/"},{"reference_url":"https://usn.ubuntu.com/7655-1/","reference_id":"USN-7655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7655-1/"},{"reference_url":"https://usn.ubuntu.com/7835-1/","reference_id":"USN-7835-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7835-1/"},{"reference_url":"https://usn.ubuntu.com/7835-2/","reference_id":"USN-7835-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7835-2/"},{"reference_url":"https://usn.ubuntu.com/7835-3/","reference_id":"USN-7835-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7835-3/"},{"reference_url":"https://usn.ubuntu.com/7835-4/","reference_id":"USN-7835-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7835-4/"},{"reference_url":"https://usn.ubuntu.com/7835-5/","reference_id":"USN-7835-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7835-5/"},{"reference_url":"https://usn.ubuntu.com/7835-6/","reference_id":"USN-7835-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7835-6/"},{"reference_url":"https://usn.ubuntu.com/7887-1/","reference_id":"USN-7887-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7887-1/"},{"reference_url":"https://usn.ubuntu.com/7887-2/","reference_id":"USN-7887-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7887-2/"},{"reference_url":"https://usn.ubuntu.com/7940-1/","reference_id":"USN-7940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7940-1/"},{"reference_url":"https://usn.ubuntu.com/7940-2/","reference_id":"USN-7940-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7940-2/"}],"fixed_packages":[],"aliases":["CVE-2023-53034"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-te8s-rb5h-87fd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66760?format=json","vulnerability_id":"VCID-x8jd-vket-qkec","summary":"kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53705.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53705.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53705","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12252","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12297","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12095","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12177","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12228","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12199","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12163","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12033","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12035","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1215","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12126","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12092","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11992","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11905","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1204","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53705"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405713","reference_id":"2405713","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3138","reference_id":"RHSA-2024:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0532","reference_id":"RHSA-2026:0532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0533","reference_id":"RHSA-2026:0533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0537","reference_id":"RHSA-2026:0537","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0576","reference_id":"RHSA-2026:0576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0754","reference_id":"RHSA-2026:0754","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0755","reference_id":"RHSA-2026:0755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1442","reference_id":"RHSA-2026:1442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1512","reference_id":"RHSA-2026:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1512"}],"fixed_packages":[],"aliases":["CVE-2023-53705"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x8jd-vket-qkec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69935?format=json","vulnerability_id":"VCID-z5d6-d49x-7fay","summary":"kernel: Linux kernel: SCTP use-after-free due to race condition in sendmsg","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-23142.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-23142.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-23142","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20271","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19996","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20076","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20134","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20159","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20056","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20038","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20042","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19925","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.1992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.1989","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19796","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19873","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-23142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23142"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363300","reference_id":"2363300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0457","reference_id":"RHSA-2026:0457","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0457"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0489","reference_id":"RHSA-2026:0489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0537","reference_id":"RHSA-2026:0537","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0576","reference_id":"RHSA-2026:0576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://usn.ubuntu.com/7594-1/","reference_id":"USN-7594-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-1/"},{"reference_url":"https://usn.ubuntu.com/7594-2/","reference_id":"USN-7594-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-2/"},{"reference_url":"https://usn.ubuntu.com/7594-3/","reference_id":"USN-7594-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-3/"},{"reference_url":"https://usn.ubuntu.com/7654-1/","reference_id":"USN-7654-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-1/"},{"reference_url":"https://usn.ubuntu.com/7654-2/","reference_id":"USN-7654-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-2/"},{"reference_url":"https://usn.ubuntu.com/7654-3/","reference_id":"USN-7654-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-3/"},{"reference_url":"https://usn.ubuntu.com/7654-4/","reference_id":"USN-7654-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-4/"},{"reference_url":"https://usn.ubuntu.com/7654-5/","reference_id":"USN-7654-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-5/"},{"reference_url":"https://usn.ubuntu.com/7655-1/","reference_id":"USN-7655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7655-1/"},{"reference_url":"https://usn.ubuntu.com/7686-1/","reference_id":"USN-7686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7686-1/"},{"reference_url":"https://usn.ubuntu.com/7711-1/","reference_id":"USN-7711-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7711-1/"},{"reference_url":"https://usn.ubuntu.com/7712-1/","reference_id":"USN-7712-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7712-1/"},{"reference_url":"https://usn.ubuntu.com/7712-2/","reference_id":"USN-7712-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7712-2/"},{"reference_url":"https://usn.ubuntu.com/8028-1/","reference_id":"USN-8028-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-1/"},{"reference_url":"https://usn.ubuntu.com/8028-2/","reference_id":"USN-8028-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-2/"},{"reference_url":"https://usn.ubuntu.com/8028-3/","reference_id":"USN-8028-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-3/"},{"reference_url":"https://usn.ubuntu.com/8028-4/","reference_id":"USN-8028-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-4/"},{"reference_url":"https://usn.ubuntu.com/8028-5/","reference_id":"USN-8028-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-5/"},{"reference_url":"https://usn.ubuntu.com/8028-6/","reference_id":"USN-8028-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-6/"},{"reference_url":"https://usn.ubuntu.com/8028-7/","reference_id":"USN-8028-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-7/"},{"reference_url":"https://usn.ubuntu.com/8028-8/","reference_id":"USN-8028-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-8/"},{"reference_url":"https://usn.ubuntu.com/8031-1/","reference_id":"USN-8031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-1/"},{"reference_url":"https://usn.ubuntu.com/8031-2/","reference_id":"USN-8031-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-2/"},{"reference_url":"https://usn.ubuntu.com/8031-3/","reference_id":"USN-8031-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-3/"},{"reference_url":"https://usn.ubuntu.com/8052-1/","reference_id":"USN-8052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-1/"},{"reference_url":"https://usn.ubuntu.com/8052-2/","reference_id":"USN-8052-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-2/"},{"reference_url":"https://usn.ubuntu.com/8074-1/","reference_id":"USN-8074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-1/"},{"reference_url":"https://usn.ubuntu.com/8074-2/","reference_id":"USN-8074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-2/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"}],"fixed_packages":[],"aliases":["CVE-2025-23142"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z5d6-d49x-7fay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71037?format=json","vulnerability_id":"VCID-zvgb-kf4f-gye2","summary":"kernel: Linux kernel: iommufd/iova_bitmap shift-out-of-bounds vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21724.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21724.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21724","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07151","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07019","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06983","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07002","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06985","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06987","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06979","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06974","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06912","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06896","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07032","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10457","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10526","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21724"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348649","reference_id":"2348649","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348649"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0917","reference_id":"RHSA-2026:0917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0917"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://usn.ubuntu.com/7521-1/","reference_id":"USN-7521-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7521-1/"},{"reference_url":"https://usn.ubuntu.com/7521-2/","reference_id":"USN-7521-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7521-2/"},{"reference_url":"https://usn.ubuntu.com/7521-3/","reference_id":"USN-7521-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7521-3/"},{"reference_url":"https://usn.ubuntu.com/7651-1/","reference_id":"USN-7651-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7651-1/"},{"reference_url":"https://usn.ubuntu.com/7651-2/","reference_id":"USN-7651-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7651-2/"},{"reference_url":"https://usn.ubuntu.com/7651-3/","reference_id":"USN-7651-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7651-3/"},{"reference_url":"https://usn.ubuntu.com/7651-4/","reference_id":"USN-7651-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7651-4/"},{"reference_url":"https://usn.ubuntu.com/7651-5/","reference_id":"USN-7651-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7651-5/"},{"reference_url":"https://usn.ubuntu.com/7651-6/","reference_id":"USN-7651-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7651-6/"},{"reference_url":"https://usn.ubuntu.com/7652-1/","reference_id":"USN-7652-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7652-1/"},{"reference_url":"https://usn.ubuntu.com/7653-1/","reference_id":"USN-7653-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7653-1/"},{"reference_url":"https://usn.ubuntu.com/7737-1/","reference_id":"USN-7737-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7737-1/"}],"fixed_packages":[],"aliases":["CVE-2025-21724"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zvgb-kf4f-gye2"}],"fixing_vulnerabilities":[],"risk_score":"3.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-284.154.1.rt14.439%3Farch=el9_2"}