Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/88550?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/88550?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-372.75.1?arch=el8_6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "4.18.0-372.75.1", "qualifiers": { "arch": "el8_6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78921?format=api", "vulnerability_id": "VCID-1b2u-7w7f-wudv", "summary": "kernel: use-after-free due to race condition in qdisc_graft()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0590.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0590.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0590", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01818", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01789", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01801", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01804", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02665", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02682", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02668", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02801", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02775", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02646", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02654", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02766", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02756", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02744", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05764", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165741", "reference_id": "2165741", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901", "reference_id": "RHSA-2023:6901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7382", "reference_id": "RHSA-2023:7382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7389", "reference_id": "RHSA-2023:7389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7389" }, { "reference_url": "https://usn.ubuntu.com/5850-1/", "reference_id": "USN-5850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5850-1/" }, { "reference_url": "https://usn.ubuntu.com/5851-1/", "reference_id": "USN-5851-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5851-1/" }, { "reference_url": "https://usn.ubuntu.com/5860-1/", "reference_id": "USN-5860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5860-1/" }, { "reference_url": "https://usn.ubuntu.com/5876-1/", "reference_id": "USN-5876-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5876-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5878-1/", "reference_id": "USN-5878-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5878-1/" }, { "reference_url": "https://usn.ubuntu.com/5879-1/", "reference_id": "USN-5879-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5879-1/" }, { "reference_url": "https://usn.ubuntu.com/6284-1/", "reference_id": "USN-6284-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6284-1/" }, { "reference_url": "https://usn.ubuntu.com/6301-1/", "reference_id": "USN-6301-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6301-1/" }, { "reference_url": "https://usn.ubuntu.com/6312-1/", "reference_id": "USN-6312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6312-1/" }, { "reference_url": "https://usn.ubuntu.com/6314-1/", "reference_id": "USN-6314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6314-1/" }, { "reference_url": "https://usn.ubuntu.com/6331-1/", "reference_id": "USN-6331-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6331-1/" }, { "reference_url": "https://usn.ubuntu.com/6337-1/", "reference_id": "USN-6337-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6337-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-0590" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1b2u-7w7f-wudv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78261?format=api", "vulnerability_id": "VCID-9cat-tz9k-9kcb", "summary": "kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4004.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4004.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4004", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03162", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03172", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03174", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03179", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03205", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03163", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03138", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.031", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03107", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03227", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03222", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03271", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03225", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03249", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225275", "reference_id": "2225275", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225275" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4961", "reference_id": "RHSA-2023:4961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4962", "reference_id": "RHSA-2023:4962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4967", "reference_id": "RHSA-2023:4967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5069", "reference_id": "RHSA-2023:5069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5091", "reference_id": "RHSA-2023:5091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5093", "reference_id": "RHSA-2023:5093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5221", "reference_id": "RHSA-2023:5221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5244", "reference_id": "RHSA-2023:5244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5244" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5255", "reference_id": "RHSA-2023:5255", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5255" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5548", "reference_id": "RHSA-2023:5548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7382", "reference_id": "RHSA-2023:7382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7389", "reference_id": "RHSA-2023:7389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7411", "reference_id": "RHSA-2023:7411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7417", "reference_id": "RHSA-2023:7417", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7417" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7431", "reference_id": "RHSA-2023:7431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7434", "reference_id": "RHSA-2023:7434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7434" }, { "reference_url": "https://usn.ubuntu.com/6315-1/", "reference_id": "USN-6315-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6315-1/" }, { "reference_url": "https://usn.ubuntu.com/6316-1/", "reference_id": "USN-6316-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6316-1/" }, { "reference_url": "https://usn.ubuntu.com/6318-1/", "reference_id": "USN-6318-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6318-1/" }, { "reference_url": "https://usn.ubuntu.com/6321-1/", "reference_id": "USN-6321-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6321-1/" }, { "reference_url": "https://usn.ubuntu.com/6325-1/", "reference_id": "USN-6325-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6325-1/" }, { "reference_url": "https://usn.ubuntu.com/6328-1/", "reference_id": "USN-6328-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6328-1/" }, { "reference_url": "https://usn.ubuntu.com/6330-1/", "reference_id": "USN-6330-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6330-1/" }, { "reference_url": "https://usn.ubuntu.com/6332-1/", "reference_id": "USN-6332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6332-1/" }, { "reference_url": "https://usn.ubuntu.com/6348-1/", "reference_id": "USN-6348-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6348-1/" }, { "reference_url": "https://usn.ubuntu.com/6385-1/", "reference_id": "USN-6385-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6385-1/" }, { "reference_url": "https://usn.ubuntu.com/6442-1/", "reference_id": "USN-6442-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6442-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-4004" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9cat-tz9k-9kcb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78419?format=api", "vulnerability_id": "VCID-axj2-267a-5kdv", "summary": "kernel: ipvlan: out-of-bounds write caused by unclear skb->cb", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3090.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3090.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3090", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01738", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01748", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0175", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0174", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01765", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01753", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01754", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0176", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01823", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02109", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02145", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.0216", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02114", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3090" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218672", "reference_id": "2218672", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218672" }, { "reference_url": "https://kernel.dance/90cbed5247439a966b645b34eb0a2e037836ea8e", "reference_id": "90cbed5247439a966b645b34eb0a2e037836ea8e", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/" } ], "url": "https://kernel.dance/90cbed5247439a966b645b34eb0a2e037836ea8e" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5448", "reference_id": "dsa-5448", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5448" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5480", "reference_id": "dsa-5480", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5480" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e", "reference_id": "?id=90cbed5247439a966b645b34eb0a2e037836ea8e", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e" }, { "reference_url": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html", "reference_id": "Kernel-Live-Patch-Security-Notice-LSN-0097-1.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/" } ], "url": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html" }, { "reference_url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html", "reference_id": "Kernel-Live-Patch-Security-Notice-LSN-0098-1.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/" } ], "url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", "reference_id": "msg00027.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", "reference_id": "msg00030.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230731-0002/", "reference_id": "ntap-20230731-0002", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230731-0002/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4377", "reference_id": "RHSA-2023:4377", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4377" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4378", "reference_id": "RHSA-2023:4378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4380", "reference_id": "RHSA-2023:4380", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4380" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4515", "reference_id": "RHSA-2023:4515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4515" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4516", "reference_id": "RHSA-2023:4516", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4516" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4801", "reference_id": "RHSA-2023:4801", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4801" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4814", "reference_id": "RHSA-2023:4814", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4814" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4815", "reference_id": "RHSA-2023:4815", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4815" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4817", "reference_id": "RHSA-2023:4817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4828", "reference_id": "RHSA-2023:4828", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4829", "reference_id": "RHSA-2023:4829", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4829" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4961", "reference_id": "RHSA-2023:4961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4962", "reference_id": "RHSA-2023:4962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4967", "reference_id": "RHSA-2023:4967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5221", "reference_id": "RHSA-2023:5221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5244", "reference_id": "RHSA-2023:5244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5244" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5255", "reference_id": "RHSA-2023:5255", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5255" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5548", "reference_id": "RHSA-2023:5548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://usn.ubuntu.com/6231-1/", "reference_id": "USN-6231-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6231-1/" }, { "reference_url": "https://usn.ubuntu.com/6246-1/", "reference_id": "USN-6246-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6246-1/" }, { "reference_url": "https://usn.ubuntu.com/6250-1/", "reference_id": "USN-6250-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6250-1/" }, { "reference_url": "https://usn.ubuntu.com/6251-1/", "reference_id": "USN-6251-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6251-1/" }, { "reference_url": "https://usn.ubuntu.com/6252-1/", "reference_id": "USN-6252-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6252-1/" }, { "reference_url": "https://usn.ubuntu.com/6254-1/", "reference_id": "USN-6254-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6254-1/" }, { "reference_url": "https://usn.ubuntu.com/6255-1/", "reference_id": "USN-6255-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6255-1/" }, { "reference_url": "https://usn.ubuntu.com/6260-1/", "reference_id": "USN-6260-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6260-1/" }, { "reference_url": "https://usn.ubuntu.com/6261-1/", "reference_id": "USN-6261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6261-1/" }, { "reference_url": "https://usn.ubuntu.com/6385-1/", "reference_id": "USN-6385-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6385-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-3090" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-axj2-267a-5kdv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79131?format=api", "vulnerability_id": "VCID-bp6k-v3c5-gudy", "summary": "kernel: LoadPin bypass via dm-verity table reload", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2503.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2503.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2503", "reference_id": "", "reference_type": "", "scores": [ { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00201", "published_at": "2026-05-05T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.002", "published_at": "2026-04-29T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00202", "published_at": "2026-04-26T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00195", "published_at": "2026-04-13T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00194", "published_at": "2026-04-07T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00197", "published_at": "2026-04-18T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00193", "published_at": "2026-04-09T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00206", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2503" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177862", "reference_id": "2177862", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177862" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m", "reference_id": "GHSA-6vq3-w69p-w63m", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-21T13:39:52Z/" } ], "url": "https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230214-0005/", "reference_id": "ntap-20230214-0005", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-21T13:39:52Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230214-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7444", "reference_id": "RHSA-2022:7444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7683", "reference_id": "RHSA-2022:7683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://usn.ubuntu.com/5594-1/", "reference_id": "USN-5594-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5594-1/" }, { "reference_url": "https://usn.ubuntu.com/5599-1/", "reference_id": "USN-5599-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5599-1/" }, { "reference_url": "https://usn.ubuntu.com/5602-1/", "reference_id": "USN-5602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5602-1/" }, { "reference_url": "https://usn.ubuntu.com/5616-1/", "reference_id": "USN-5616-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5616-1/" }, { "reference_url": "https://usn.ubuntu.com/5622-1/", "reference_id": "USN-5622-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5622-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5630-1/", "reference_id": "USN-5630-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5630-1/" }, { "reference_url": "https://usn.ubuntu.com/5639-1/", "reference_id": "USN-5639-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5639-1/" }, { "reference_url": "https://usn.ubuntu.com/5647-1/", "reference_id": "USN-5647-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5647-1/" }, { "reference_url": "https://usn.ubuntu.com/5654-1/", "reference_id": "USN-5654-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5654-1/" }, { "reference_url": "https://usn.ubuntu.com/5660-1/", "reference_id": "USN-5660-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5660-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-2503" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bp6k-v3c5-gudy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67116?format=api", "vulnerability_id": "VCID-dm3r-us9z-5uc3", "summary": "kernel: Linux kernel iavf driver: Denial of Service via use-after-free vulnerability", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53556.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53556.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53556", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03107", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.0312", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03125", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.0315", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03109", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03083", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.0307", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03175", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03168", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03214", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03045", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03054", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03172", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0435", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04374", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53556" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401478", "reference_id": "2401478", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401478" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5069", "reference_id": "RHSA-2023:5069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53556" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dm3r-us9z-5uc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79173?format=api", "vulnerability_id": "VCID-ensk-7dvm-p7g7", "summary": "kernel: an out-of-bounds vulnerability in i2c-ismt driver", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2873.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2873.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2873", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12107", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12224", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12202", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12167", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12054", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.11969", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1231", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12358", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12156", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12235", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12285", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12293", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12256", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12219", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12109", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12113", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048", "reference_id": "2119048", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0832", "reference_id": "RHSA-2023:0832", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0832" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0854", "reference_id": "RHSA-2023:0854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0951", "reference_id": "RHSA-2023:0951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0979", "reference_id": "RHSA-2023:0979", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0979" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://usn.ubuntu.com/5594-1/", "reference_id": "USN-5594-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5594-1/" }, { "reference_url": "https://usn.ubuntu.com/5599-1/", "reference_id": "USN-5599-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5599-1/" }, { "reference_url": "https://usn.ubuntu.com/5602-1/", "reference_id": "USN-5602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5602-1/" }, { "reference_url": "https://usn.ubuntu.com/5616-1/", "reference_id": "USN-5616-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5616-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-2873" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ensk-7dvm-p7g7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78356?format=api", "vulnerability_id": "VCID-j7z5-3htn-vkd2", "summary": "kernel: hash collisions in the IPv6 connection lookup table", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1206.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1206.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1206", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11447", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11435", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11294", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11376", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1144", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11408", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11378", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11236", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11238", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11366", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11307", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12053", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12133", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12242", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12191", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175903", "reference_id": "2175903", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175903" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5480", "reference_id": "dsa-5480", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5480" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5492", "reference_id": "dsa-5492", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5492" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html", "reference_id": "msg00004.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", "reference_id": "msg00027.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230929-0006/", "reference_id": "ntap-20230929-0006", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230929-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5603", "reference_id": "RHSA-2023:5603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5604", "reference_id": "RHSA-2023:5604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901", "reference_id": "RHSA-2023:6901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://usn.ubuntu.com/6343-1/", "reference_id": "USN-6343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6343-1/" }, { "reference_url": "https://usn.ubuntu.com/6385-1/", "reference_id": "USN-6385-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6385-1/" }, { "reference_url": "https://usn.ubuntu.com/6412-1/", "reference_id": "USN-6412-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6412-1/" }, { "reference_url": "https://usn.ubuntu.com/6416-1/", "reference_id": "USN-6416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6416-1/" }, { "reference_url": "https://usn.ubuntu.com/6416-2/", "reference_id": "USN-6416-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6416-2/" }, { "reference_url": "https://usn.ubuntu.com/6416-3/", "reference_id": "USN-6416-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6416-3/" }, { "reference_url": "https://usn.ubuntu.com/6417-1/", "reference_id": "USN-6417-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6417-1/" }, { "reference_url": "https://usn.ubuntu.com/6439-1/", "reference_id": "USN-6439-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6439-1/" }, { "reference_url": "https://usn.ubuntu.com/6439-2/", "reference_id": "USN-6439-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6439-2/" }, { "reference_url": "https://usn.ubuntu.com/6440-1/", "reference_id": "USN-6440-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6440-1/" }, { "reference_url": "https://usn.ubuntu.com/6440-2/", "reference_id": "USN-6440-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6440-2/" }, { "reference_url": "https://usn.ubuntu.com/6440-3/", "reference_id": "USN-6440-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6440-3/" }, { "reference_url": "https://usn.ubuntu.com/6445-1/", "reference_id": "USN-6445-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6445-1/" }, { "reference_url": "https://usn.ubuntu.com/6445-2/", "reference_id": "USN-6445-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6445-2/" }, { "reference_url": "https://usn.ubuntu.com/6460-1/", "reference_id": "USN-6460-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6460-1/" }, { "reference_url": "https://usn.ubuntu.com/6466-1/", "reference_id": "USN-6466-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6466-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-1206" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7z5-3htn-vkd2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67934?format=api", "vulnerability_id": "VCID-myxg-t4ps-p7ew", "summary": "kernel: scsi: storvsc: Fix handling of virtual Fibre Channel timeouts", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53245.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53245.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53245", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05261", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05229", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05344", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05322", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05286", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06378", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06085", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06079", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06071", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06036", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06045", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06208", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0624", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06248", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06266", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53245" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53245", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53245" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/048ebc9a28fb918ee635dd4b2fcf4248eb6e4050", "reference_id": "048ebc9a28fb918ee635dd4b2fcf4248eb6e4050", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/" } ], "url": "https://git.kernel.org/stable/c/048ebc9a28fb918ee635dd4b2fcf4248eb6e4050" }, { "reference_url": "https://git.kernel.org/stable/c/1678408d08f31a694d5150a56796dd04c9710b22", "reference_id": "1678408d08f31a694d5150a56796dd04c9710b22", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/" } ], "url": "https://git.kernel.org/stable/c/1678408d08f31a694d5150a56796dd04c9710b22" }, { "reference_url": "https://git.kernel.org/stable/c/175544ad48cbf56affeef2a679c6a4d4fb1e2881", "reference_id": "175544ad48cbf56affeef2a679c6a4d4fb1e2881", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/" } ], "url": "https://git.kernel.org/stable/c/175544ad48cbf56affeef2a679c6a4d4fb1e2881" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395372", "reference_id": "2395372", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395372" }, { "reference_url": "https://git.kernel.org/stable/c/311db605e07f0d4fc0cc7ddb74f1e5692ea2f469", "reference_id": "311db605e07f0d4fc0cc7ddb74f1e5692ea2f469", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/" } ], "url": "https://git.kernel.org/stable/c/311db605e07f0d4fc0cc7ddb74f1e5692ea2f469" }, { "reference_url": "https://git.kernel.org/stable/c/763c06565055ae373fe7f89c11e1447bd1ded264", "reference_id": "763c06565055ae373fe7f89c11e1447bd1ded264", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/" } ], "url": "https://git.kernel.org/stable/c/763c06565055ae373fe7f89c11e1447bd1ded264" }, { "reference_url": "https://git.kernel.org/stable/c/7a792b3d888aab2c65389f9f4f9f2f6c000b1a0d", "reference_id": "7a792b3d888aab2c65389f9f4f9f2f6c000b1a0d", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/" } ], "url": "https://git.kernel.org/stable/c/7a792b3d888aab2c65389f9f4f9f2f6c000b1a0d" }, { "reference_url": "https://git.kernel.org/stable/c/cd87f4df9865a53807001ed12c0f0420b14ececd", "reference_id": "cd87f4df9865a53807001ed12c0f0420b14ececd", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/" } ], "url": "https://git.kernel.org/stable/c/cd87f4df9865a53807001ed12c0f0420b14ececd" }, { "reference_url": "https://git.kernel.org/stable/c/ed70fa5629a8b992a5372d7044d1db1f8fa6de29", "reference_id": "ed70fa5629a8b992a5372d7044d1db1f8fa6de29", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/" } ], "url": "https://git.kernel.org/stable/c/ed70fa5629a8b992a5372d7044d1db1f8fa6de29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5604", "reference_id": "RHSA-2023:5604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53245" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-myxg-t4ps-p7ew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78238?format=api", "vulnerability_id": "VCID-n89e-y6eu-4ucf", "summary": "kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4128.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4128.json" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261965", "reference_id": "2261965", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261965" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5235", "reference_id": "RHSA-2023:5235", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5235" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5238", "reference_id": "RHSA-2023:5238", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5238" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5548", "reference_id": "RHSA-2023:5548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5575", "reference_id": "RHSA-2023:5575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5580", "reference_id": "RHSA-2023:5580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5588", "reference_id": "RHSA-2023:5588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5589", "reference_id": "RHSA-2023:5589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5603", "reference_id": "RHSA-2023:5603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5604", "reference_id": "RHSA-2023:5604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5628", "reference_id": "RHSA-2023:5628", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5628" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5775", "reference_id": "RHSA-2023:5775", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5794", "reference_id": "RHSA-2023:5794", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5794" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901", "reference_id": "RHSA-2023:6901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7370", "reference_id": "RHSA-2023:7370", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7370" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7379", "reference_id": "RHSA-2023:7379", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7379" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7418", "reference_id": "RHSA-2023:7418", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7418" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7419", "reference_id": "RHSA-2023:7419", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7419" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7423", "reference_id": "RHSA-2023:7423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7424", "reference_id": "RHSA-2023:7424", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7424" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539", "reference_id": "RHSA-2023:7539", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7539" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7558", "reference_id": "RHSA-2023:7558", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7558" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0261", "reference_id": "RHSA-2024:0261", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0261" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0262", "reference_id": "RHSA-2024:0262", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0262" }, { "reference_url": "https://usn.ubuntu.com/6343-1/", "reference_id": "USN-6343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6343-1/" }, { "reference_url": "https://usn.ubuntu.com/6383-1/", "reference_id": "USN-6383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6383-1/" }, { "reference_url": "https://usn.ubuntu.com/6385-1/", "reference_id": "USN-6385-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6385-1/" }, { "reference_url": "https://usn.ubuntu.com/6386-1/", "reference_id": "USN-6386-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6386-1/" }, { "reference_url": "https://usn.ubuntu.com/6386-2/", "reference_id": "USN-6386-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6386-2/" }, { "reference_url": "https://usn.ubuntu.com/6386-3/", "reference_id": "USN-6386-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6386-3/" }, { "reference_url": "https://usn.ubuntu.com/6387-1/", "reference_id": "USN-6387-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6387-1/" }, { "reference_url": "https://usn.ubuntu.com/6387-2/", "reference_id": "USN-6387-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6387-2/" }, { "reference_url": "https://usn.ubuntu.com/6388-1/", "reference_id": "USN-6388-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6388-1/" }, { "reference_url": "https://usn.ubuntu.com/6396-1/", "reference_id": "USN-6396-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6396-1/" }, { "reference_url": "https://usn.ubuntu.com/6396-2/", "reference_id": "USN-6396-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6396-2/" }, { "reference_url": "https://usn.ubuntu.com/6396-3/", "reference_id": "USN-6396-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6396-3/" }, { "reference_url": "https://usn.ubuntu.com/6466-1/", "reference_id": "USN-6466-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6466-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-4128" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n89e-y6eu-4ucf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79154?format=api", "vulnerability_id": "VCID-q5kt-n8qx-57dd", "summary": "kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1095.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1095.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1095", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03721", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03824", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03794", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03799", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03802", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03852", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03808", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03732", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03746", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0375", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03774", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03733", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03711", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03685", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03661", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03673", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1095" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173973", "reference_id": "2173973", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T17:30:41Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173973" }, { "reference_url": "https://github.com/torvalds/linux/commit/580077855a40741cf511766129702d97ff02f4d9", "reference_id": "580077855a40741cf511766129702d97ff02f4d9", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T17:30:41Z/" } ], "url": "https://github.com/torvalds/linux/commit/580077855a40741cf511766129702d97ff02f4d9" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5628", "reference_id": "RHSA-2023:5628", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5628" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6813", "reference_id": "RHSA-2023:6813", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6813" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" }, { "reference_url": "https://usn.ubuntu.com/6031-1/", "reference_id": "USN-6031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6031-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-1095" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5kt-n8qx-57dd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79367?format=api", "vulnerability_id": "VCID-vqy7-37ym-eufr", "summary": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36879", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06944", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06975", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06971", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0682", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06984", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06842", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0686", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06921", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06925", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06932", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06935", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06904", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06863", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06849", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10686", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10552", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119855", "reference_id": "2119855", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119855" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901", "reference_id": "commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5207", "reference_id": "dsa-5207", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5207" }, { "reference_url": "https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901", "reference_id": "f85daf0e725358be78dfd208dea5fd665d8cb901", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220901-0007/", "reference_id": "ntap-20220901-0007", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220901-0007/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://usn.ubuntu.com/5667-1/", "reference_id": "USN-5667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5667-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5703-1/", "reference_id": "USN-5703-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5703-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://usn.ubuntu.com/5727-1/", "reference_id": "USN-5727-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-1/" }, { "reference_url": "https://usn.ubuntu.com/5727-2/", "reference_id": "USN-5727-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-2/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" }, { "reference_url": "https://usn.ubuntu.com/5913-1/", "reference_id": "USN-5913-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5913-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-36879" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqy7-37ym-eufr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81600?format=api", "vulnerability_id": "VCID-xm9f-adzk-6bg9", "summary": "kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36558.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36558.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-36558", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03525", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03569", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03583", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03595", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03617", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03574", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03545", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0352", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03495", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03507", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03632", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03638", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03642", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03688", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03643", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03665", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-36558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112693", "reference_id": "2112693", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112693" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7444", "reference_id": "RHSA-2022:7444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7683", "reference_id": "RHSA-2022:7683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2003", "reference_id": "RHSA-2024:2003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2004", "reference_id": "RHSA-2024:2004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2004" } ], "fixed_packages": [], "aliases": [ "CVE-2020-36558" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xm9f-adzk-6bg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78595?format=api", "vulnerability_id": "VCID-zsmq-81fu-q3fq", "summary": "kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2235.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2235.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2235", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02509", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02639", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02616", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02601", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02589", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02652", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02623", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02522", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02524", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02528", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02549", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02529", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02518", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02517", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02504", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2235" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192589", "reference_id": "2192589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192589" }, { "reference_url": "https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2", "reference_id": "fd0815f632c24878e325821943edccc7fde947a2", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:38:34Z/" } ], "url": "https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2", "reference_id": "?id=fd0815f632c24878e325821943edccc7fde947a2", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:38:34Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3705", "reference_id": "RHSA-2023:3705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3708", "reference_id": "RHSA-2023:3708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3723", "reference_id": "RHSA-2023:3723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4137", "reference_id": "RHSA-2023:4137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4138", "reference_id": "RHSA-2023:4138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4517", "reference_id": "RHSA-2023:4517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4541", "reference_id": "RHSA-2023:4541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://usn.ubuntu.com/6175-1/", "reference_id": "USN-6175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6175-1/" }, { "reference_url": "https://usn.ubuntu.com/6186-1/", "reference_id": "USN-6186-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6186-1/" }, { "reference_url": "https://usn.ubuntu.com/6300-1/", "reference_id": "USN-6300-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6300-1/" }, { "reference_url": "https://usn.ubuntu.com/6311-1/", "reference_id": "USN-6311-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6311-1/" }, { "reference_url": "https://usn.ubuntu.com/6332-1/", "reference_id": "USN-6332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6332-1/" }, { "reference_url": "https://usn.ubuntu.com/6347-1/", "reference_id": "USN-6347-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6347-1/" }, { "reference_url": "https://usn.ubuntu.com/6385-1/", "reference_id": "USN-6385-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6385-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-2235" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zsmq-81fu-q3fq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78297?format=api", "vulnerability_id": "VCID-zvkd-p15d-7bde", "summary": "kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35001.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35001.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-35001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.4311", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43138", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43076", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.4313", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43142", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43163", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43131", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43116", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43034", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43036", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42954", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43176", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43165", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43099", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44458", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44528", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-35001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2220892", "reference_id": "2220892", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2220892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4961", "reference_id": "RHSA-2023:4961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4962", "reference_id": "RHSA-2023:4962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4967", "reference_id": "RHSA-2023:4967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5069", "reference_id": "RHSA-2023:5069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5091", "reference_id": "RHSA-2023:5091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5093", "reference_id": "RHSA-2023:5093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5221", "reference_id": "RHSA-2023:5221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5235", "reference_id": "RHSA-2023:5235", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5235" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5238", "reference_id": "RHSA-2023:5238", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5238" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5244", "reference_id": "RHSA-2023:5244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5244" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5255", "reference_id": "RHSA-2023:5255", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5255" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5414", "reference_id": "RHSA-2023:5414", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5414" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5548", "reference_id": "RHSA-2023:5548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5574", "reference_id": "RHSA-2023:5574", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5574" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5575", "reference_id": "RHSA-2023:5575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5603", "reference_id": "RHSA-2023:5603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5604", "reference_id": "RHSA-2023:5604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5621", "reference_id": "RHSA-2023:5621", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5621" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5622", "reference_id": "RHSA-2023:5622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7243", "reference_id": "RHSA-2023:7243", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7243" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1268", "reference_id": "RHSA-2024:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1269", "reference_id": "RHSA-2024:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1278", "reference_id": "RHSA-2024:1278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1278" }, { "reference_url": "https://usn.ubuntu.com/6246-1/", "reference_id": "USN-6246-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6246-1/" }, { "reference_url": "https://usn.ubuntu.com/6247-1/", "reference_id": "USN-6247-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6247-1/" }, { "reference_url": "https://usn.ubuntu.com/6248-1/", "reference_id": "USN-6248-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6248-1/" }, { "reference_url": "https://usn.ubuntu.com/6250-1/", "reference_id": "USN-6250-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6250-1/" }, { "reference_url": "https://usn.ubuntu.com/6251-1/", "reference_id": "USN-6251-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6251-1/" }, { "reference_url": "https://usn.ubuntu.com/6252-1/", "reference_id": "USN-6252-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6252-1/" }, { "reference_url": "https://usn.ubuntu.com/6254-1/", "reference_id": "USN-6254-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6254-1/" }, { "reference_url": "https://usn.ubuntu.com/6255-1/", "reference_id": "USN-6255-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6255-1/" }, { "reference_url": "https://usn.ubuntu.com/6260-1/", "reference_id": "USN-6260-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6260-1/" }, { "reference_url": "https://usn.ubuntu.com/6261-1/", "reference_id": "USN-6261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6261-1/" }, { "reference_url": "https://usn.ubuntu.com/6285-1/", "reference_id": "USN-6285-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6285-1/" }, { "reference_url": "https://usn.ubuntu.com/6460-1/", "reference_id": "USN-6460-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6460-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-35001" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zvkd-p15d-7bde" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.75.1%3Farch=el8_6" }