{"url":"http://public2.vulnerablecode.io/api/packages/88554?format=json","purl":"pkg:rpm/redhat/kernel@4.18.0-193.141.1?arch=el8_2","type":"rpm","namespace":"redhat","name":"kernel","version":"4.18.0-193.141.1","qualifiers":{"arch":"el8_2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74679?format=json","vulnerability_id":"VCID-2z8j-28sb-9bbg","summary":"kernel: virtio-net: tun: mlx5_core short frame denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41091.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41091.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-41091","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03108","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02995","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02983","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03003","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03024","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0306","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03071","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03077","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02898","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02922","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02923","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02918","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0289","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02871","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02881","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-41091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42232","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42232"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42236","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42236"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42247","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42247"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/049584807f1d797fc3078b68035450a9769eb5c3","reference_id":"049584807f1d797fc3078b68035450a9769eb5c3","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:56Z/"}],"url":"https://git.kernel.org/stable/c/049584807f1d797fc3078b68035450a9769eb5c3"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2299336","reference_id":"2299336","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2299336"},{"reference_url":"https://git.kernel.org/stable/c/32b0aaba5dbc85816898167d9b5d45a22eae82e9","reference_id":"32b0aaba5dbc85816898167d9b5d45a22eae82e9","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:56Z/"}],"url":"https://git.kernel.org/stable/c/32b0aaba5dbc85816898167d9b5d45a22eae82e9"},{"reference_url":"https://git.kernel.org/stable/c/589382f50b4a5d90d16d8bc9dcbc0e927a3e39b2","reference_id":"589382f50b4a5d90d16d8bc9dcbc0e927a3e39b2","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:56Z/"}],"url":"https://git.kernel.org/stable/c/589382f50b4a5d90d16d8bc9dcbc0e927a3e39b2"},{"reference_url":"https://git.kernel.org/stable/c/6100e0237204890269e3f934acfc50d35fd6f319","reference_id":"6100e0237204890269e3f934acfc50d35fd6f319","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:56Z/"}],"url":"https://git.kernel.org/stable/c/6100e0237204890269e3f934acfc50d35fd6f319"},{"reference_url":"https://git.kernel.org/stable/c/8418f55302fa1d2eeb73e16e345167e545c598a5","reference_id":"8418f55302fa1d2eeb73e16e345167e545c598a5","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:56Z/"}],"url":"https://git.kernel.org/stable/c/8418f55302fa1d2eeb73e16e345167e545c598a5"},{"reference_url":"https://git.kernel.org/stable/c/a9d1c27e2ee3b0ea5d40c105d6e728fc114470bb","reference_id":"a9d1c27e2ee3b0ea5d40c105d6e728fc114470bb","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:56Z/"}],"url":"https://git.kernel.org/stable/c/a9d1c27e2ee3b0ea5d40c105d6e728fc114470bb"},{"reference_url":"https://git.kernel.org/stable/c/ad6b3f622ccfb4bfedfa53b6ebd91c3d1d04f146","reference_id":"ad6b3f622ccfb4bfedfa53b6ebd91c3d1d04f146","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:56Z/"}],"url":"https://git.kernel.org/stable/c/ad6b3f622ccfb4bfedfa53b6ebd91c3d1d04f146"},{"reference_url":"https://git.kernel.org/stable/c/d5ad89b7d01ed4e66fd04734fc63d6e78536692a","reference_id":"d5ad89b7d01ed4e66fd04734fc63d6e78536692a","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:56Z/"}],"url":"https://git.kernel.org/stable/c/d5ad89b7d01ed4e66fd04734fc63d6e78536692a"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5256","reference_id":"RHSA-2024:5256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5257","reference_id":"RHSA-2024:5257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5257"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5281","reference_id":"RHSA-2024:5281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5582","reference_id":"RHSA-2024:5582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5672","reference_id":"RHSA-2024:5672","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5672"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5673","reference_id":"RHSA-2024:5673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5673"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5858","reference_id":"RHSA-2024:5858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5928","reference_id":"RHSA-2024:5928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6156","reference_id":"RHSA-2024:6156","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6156"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6160","reference_id":"RHSA-2024:6160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6160"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6206","reference_id":"RHSA-2024:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6242","reference_id":"RHSA-2024:6242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6313","reference_id":"RHSA-2024:6313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6313"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6560","reference_id":"RHSA-2024:6560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6663","reference_id":"RHSA-2024:6663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6992","reference_id":"RHSA-2024:6992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7000","reference_id":"RHSA-2024:7000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7001","reference_id":"RHSA-2024:7001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7429","reference_id":"RHSA-2024:7429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7429"},{"reference_url":"https://usn.ubuntu.com/7088-1/","reference_id":"USN-7088-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-1/"},{"reference_url":"https://usn.ubuntu.com/7088-2/","reference_id":"USN-7088-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-2/"},{"reference_url":"https://usn.ubuntu.com/7088-3/","reference_id":"USN-7088-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-3/"},{"reference_url":"https://usn.ubuntu.com/7088-4/","reference_id":"USN-7088-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-4/"},{"reference_url":"https://usn.ubuntu.com/7088-5/","reference_id":"USN-7088-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-5/"},{"reference_url":"https://usn.ubuntu.com/7089-1/","reference_id":"USN-7089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-1/"},{"reference_url":"https://usn.ubuntu.com/7089-2/","reference_id":"USN-7089-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-2/"},{"reference_url":"https://usn.ubuntu.com/7089-3/","reference_id":"USN-7089-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-3/"},{"reference_url":"https://usn.ubuntu.com/7089-4/","reference_id":"USN-7089-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-4/"},{"reference_url":"https://usn.ubuntu.com/7089-5/","reference_id":"USN-7089-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-5/"},{"reference_url":"https://usn.ubuntu.com/7089-6/","reference_id":"USN-7089-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-6/"},{"reference_url":"https://usn.ubuntu.com/7089-7/","reference_id":"USN-7089-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-7/"},{"reference_url":"https://usn.ubuntu.com/7090-1/","reference_id":"USN-7090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7090-1/"},{"reference_url":"https://usn.ubuntu.com/7095-1/","reference_id":"USN-7095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7095-1/"},{"reference_url":"https://usn.ubuntu.com/7100-1/","reference_id":"USN-7100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7100-1/"},{"reference_url":"https://usn.ubuntu.com/7100-2/","reference_id":"USN-7100-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7100-2/"},{"reference_url":"https://usn.ubuntu.com/7119-1/","reference_id":"USN-7119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7119-1/"},{"reference_url":"https://usn.ubuntu.com/7123-1/","reference_id":"USN-7123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7123-1/"},{"reference_url":"https://usn.ubuntu.com/7144-1/","reference_id":"USN-7144-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7144-1/"},{"reference_url":"https://usn.ubuntu.com/7156-1/","reference_id":"USN-7156-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7156-1/"},{"reference_url":"https://usn.ubuntu.com/7194-1/","reference_id":"USN-7194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7194-1/"}],"fixed_packages":[],"aliases":["CVE-2024-41091"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2z8j-28sb-9bbg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74777?format=json","vulnerability_id":"VCID-4cyz-4ndz-k7gc","summary":"kernel: NFSD: Fix NFSv3 SETATTR/CREATE&#39;s handling of large file sizes","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48829.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48829.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48829","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01684","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01676","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05552","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05798","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05807","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05818","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05898","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05962","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05975","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05589","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05587","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0565","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05623","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05615","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05559","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05762","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48829"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48829","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48829"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298168","reference_id":"2298168","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298168"},{"reference_url":"https://git.kernel.org/stable/c/37f2d2cd8eadddbbd9c7bda327a9393399b2f89b","reference_id":"37f2d2cd8eadddbbd9c7bda327a9393399b2f89b","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:57:33Z/"}],"url":"https://git.kernel.org/stable/c/37f2d2cd8eadddbbd9c7bda327a9393399b2f89b"},{"reference_url":"https://git.kernel.org/stable/c/72c14aed6838b5d90b4dd926b6a339b34bb02e08","reference_id":"72c14aed6838b5d90b4dd926b6a339b34bb02e08","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:57:33Z/"}],"url":"https://git.kernel.org/stable/c/72c14aed6838b5d90b4dd926b6a339b34bb02e08"},{"reference_url":"https://git.kernel.org/stable/c/a231ae6bb50e7c0a9e9efd7b0d10687f1d71b3a3","reference_id":"a231ae6bb50e7c0a9e9efd7b0d10687f1d71b3a3","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:57:33Z/"}],"url":"https://git.kernel.org/stable/c/a231ae6bb50e7c0a9e9efd7b0d10687f1d71b3a3"},{"reference_url":"https://git.kernel.org/stable/c/a648fdeb7c0e17177a2280344d015dba3fbe3314","reference_id":"a648fdeb7c0e17177a2280344d015dba3fbe3314","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:57:33Z/"}],"url":"https://git.kernel.org/stable/c/a648fdeb7c0e17177a2280344d015dba3fbe3314"},{"reference_url":"https://git.kernel.org/stable/c/aa9051ddb4b378bd22e72a67bc77b9fc1482c5f0","reference_id":"aa9051ddb4b378bd22e72a67bc77b9fc1482c5f0","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:57:33Z/"}],"url":"https://git.kernel.org/stable/c/aa9051ddb4b378bd22e72a67bc77b9fc1482c5f0"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5266","reference_id":"RHSA-2024:5266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5281","reference_id":"RHSA-2024:5281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5282","reference_id":"RHSA-2024:5282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6992","reference_id":"RHSA-2024:6992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6992"}],"fixed_packages":[],"aliases":["CVE-2022-48829"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4cyz-4ndz-k7gc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74747?format=json","vulnerability_id":"VCID-7a92-8b2d-1ye4","summary":"kernel: perf: Fix list corruption in perf_cgroup_switch()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48799.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48799","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02654","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0285","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02745","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02732","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02787","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02759","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02775","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02812","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02819","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02818","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02667","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02674","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02676","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02697","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02669","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02656","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02653","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02635","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02643","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02754","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48799"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/2142bc1469a316fddd10012d76428f7265258f81","reference_id":"2142bc1469a316fddd10012d76428f7265258f81","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:09Z/"}],"url":"https://git.kernel.org/stable/c/2142bc1469a316fddd10012d76428f7265258f81"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298135","reference_id":"2298135","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298135"},{"reference_url":"https://git.kernel.org/stable/c/30d9f3cbe47e1018ddc8069ac5b5c9e66fbdf727","reference_id":"30d9f3cbe47e1018ddc8069ac5b5c9e66fbdf727","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:09Z/"}],"url":"https://git.kernel.org/stable/c/30d9f3cbe47e1018ddc8069ac5b5c9e66fbdf727"},{"reference_url":"https://git.kernel.org/stable/c/5d76ed4223403f90421782adb2f20a9ecbc93186","reference_id":"5d76ed4223403f90421782adb2f20a9ecbc93186","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:09Z/"}],"url":"https://git.kernel.org/stable/c/5d76ed4223403f90421782adb2f20a9ecbc93186"},{"reference_url":"https://git.kernel.org/stable/c/5f4e5ce638e6a490b976ade4a40017b40abb2da0","reference_id":"5f4e5ce638e6a490b976ade4a40017b40abb2da0","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:09Z/"}],"url":"https://git.kernel.org/stable/c/5f4e5ce638e6a490b976ade4a40017b40abb2da0"},{"reference_url":"https://git.kernel.org/stable/c/7969fe91c9830e045901970e9d755b7505881d4a","reference_id":"7969fe91c9830e045901970e9d755b7505881d4a","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:09Z/"}],"url":"https://git.kernel.org/stable/c/7969fe91c9830e045901970e9d755b7505881d4a"},{"reference_url":"https://git.kernel.org/stable/c/a2ed7b29d0673ba361546e2d87dbbed149456c45","reference_id":"a2ed7b29d0673ba361546e2d87dbbed149456c45","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:09Z/"}],"url":"https://git.kernel.org/stable/c/a2ed7b29d0673ba361546e2d87dbbed149456c45"},{"reference_url":"https://git.kernel.org/stable/c/f6b5d51976fcefef5732da3e3feb3ccff680f7c8","reference_id":"f6b5d51976fcefef5732da3e3feb3ccff680f7c8","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:09Z/"}],"url":"https://git.kernel.org/stable/c/f6b5d51976fcefef5732da3e3feb3ccff680f7c8"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5692","reference_id":"RHSA-2024:5692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5692"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6156","reference_id":"RHSA-2024:6156","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6156"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6160","reference_id":"RHSA-2024:6160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6160"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6990","reference_id":"RHSA-2024:6990","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6990"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6991","reference_id":"RHSA-2024:6991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6991"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6992","reference_id":"RHSA-2024:6992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6992"}],"fixed_packages":[],"aliases":["CVE-2022-48799"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7a92-8b2d-1ye4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67150?format=json","vulnerability_id":"VCID-7y9x-fggy-gyg9","summary":"kernel: x86/xen: Fix memory leak in xen_smp_intr_init{_pv}()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50495.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50495.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401512","reference_id":"2401512","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5101","reference_id":"RHSA-2024:5101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5928","reference_id":"RHSA-2024:5928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6992","reference_id":"RHSA-2024:6992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9315","reference_id":"RHSA-2024:9315","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9315"}],"fixed_packages":[],"aliases":["CVE-2022-50495"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7y9x-fggy-gyg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74599?format=json","vulnerability_id":"VCID-nhbr-efwv-f7fm","summary":"kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41071.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41071.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2300448","reference_id":"2300448","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2300448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6990","reference_id":"RHSA-2024:6990","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6990"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6991","reference_id":"RHSA-2024:6991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6991"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6992","reference_id":"RHSA-2024:6992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6993","reference_id":"RHSA-2024:6993","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6993"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6994","reference_id":"RHSA-2024:6994","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6994"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6995","reference_id":"RHSA-2024:6995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6997","reference_id":"RHSA-2024:6997","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6997"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6998","reference_id":"RHSA-2024:6998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6999","reference_id":"RHSA-2024:6999","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7000","reference_id":"RHSA-2024:7000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7001","reference_id":"RHSA-2024:7001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7002","reference_id":"RHSA-2024:7002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7003","reference_id":"RHSA-2024:7003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7004","reference_id":"RHSA-2024:7004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7005","reference_id":"RHSA-2024:7005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7227","reference_id":"RHSA-2024:7227","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7227"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7427","reference_id":"RHSA-2024:7427","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7428","reference_id":"RHSA-2024:7428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7429","reference_id":"RHSA-2024:7429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7430","reference_id":"RHSA-2024:7430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7431","reference_id":"RHSA-2024:7431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7432","reference_id":"RHSA-2024:7432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7433","reference_id":"RHSA-2024:7433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7433"},{"reference_url":"https://usn.ubuntu.com/7088-1/","reference_id":"USN-7088-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-1/"},{"reference_url":"https://usn.ubuntu.com/7088-2/","reference_id":"USN-7088-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-2/"},{"reference_url":"https://usn.ubuntu.com/7088-3/","reference_id":"USN-7088-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-3/"},{"reference_url":"https://usn.ubuntu.com/7088-4/","reference_id":"USN-7088-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-4/"},{"reference_url":"https://usn.ubuntu.com/7088-5/","reference_id":"USN-7088-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-5/"},{"reference_url":"https://usn.ubuntu.com/7089-1/","reference_id":"USN-7089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-1/"},{"reference_url":"https://usn.ubuntu.com/7089-2/","reference_id":"USN-7089-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-2/"},{"reference_url":"https://usn.ubuntu.com/7089-3/","reference_id":"USN-7089-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-3/"},{"reference_url":"https://usn.ubuntu.com/7089-4/","reference_id":"USN-7089-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-4/"},{"reference_url":"https://usn.ubuntu.com/7089-5/","reference_id":"USN-7089-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-5/"},{"reference_url":"https://usn.ubuntu.com/7089-6/","reference_id":"USN-7089-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-6/"},{"reference_url":"https://usn.ubuntu.com/7089-7/","reference_id":"USN-7089-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-7/"},{"reference_url":"https://usn.ubuntu.com/7090-1/","reference_id":"USN-7090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7090-1/"},{"reference_url":"https://usn.ubuntu.com/7095-1/","reference_id":"USN-7095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7095-1/"},{"reference_url":"https://usn.ubuntu.com/7100-1/","reference_id":"USN-7100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7100-1/"},{"reference_url":"https://usn.ubuntu.com/7100-2/","reference_id":"USN-7100-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7100-2/"},{"reference_url":"https://usn.ubuntu.com/7119-1/","reference_id":"USN-7119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7119-1/"},{"reference_url":"https://usn.ubuntu.com/7121-1/","reference_id":"USN-7121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7121-1/"},{"reference_url":"https://usn.ubuntu.com/7121-2/","reference_id":"USN-7121-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7121-2/"},{"reference_url":"https://usn.ubuntu.com/7121-3/","reference_id":"USN-7121-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7121-3/"},{"reference_url":"https://usn.ubuntu.com/7123-1/","reference_id":"USN-7123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7123-1/"},{"reference_url":"https://usn.ubuntu.com/7144-1/","reference_id":"USN-7144-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7144-1/"},{"reference_url":"https://usn.ubuntu.com/7148-1/","reference_id":"USN-7148-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7148-1/"},{"reference_url":"https://usn.ubuntu.com/7156-1/","reference_id":"USN-7156-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7156-1/"},{"reference_url":"https://usn.ubuntu.com/7194-1/","reference_id":"USN-7194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7194-1/"}],"fixed_packages":[],"aliases":["CVE-2024-41071"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nhbr-efwv-f7fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74776?format=json","vulnerability_id":"VCID-ykys-9qqs-vqbb","summary":"kernel: NFSD: Fix ia_size underflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48828.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48828.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48828","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01684","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01676","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05552","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05798","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05807","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05818","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05898","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05962","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05975","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05589","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05587","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0565","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05623","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05615","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05559","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05762","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48828"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48828","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48828"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298167","reference_id":"2298167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298167"},{"reference_url":"https://git.kernel.org/stable/c/38d02ba22e43b6fc7d291cf724bc6e3b7be6626b","reference_id":"38d02ba22e43b6fc7d291cf724bc6e3b7be6626b","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:57:36Z/"}],"url":"https://git.kernel.org/stable/c/38d02ba22e43b6fc7d291cf724bc6e3b7be6626b"},{"reference_url":"https://git.kernel.org/stable/c/8e0ecaf7a7e57b30284d6b3289cc436100fadc48","reference_id":"8e0ecaf7a7e57b30284d6b3289cc436100fadc48","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:57:36Z/"}],"url":"https://git.kernel.org/stable/c/8e0ecaf7a7e57b30284d6b3289cc436100fadc48"},{"reference_url":"https://git.kernel.org/stable/c/d2211e6e34d0755f35e2f8c22d81999fa81cfc71","reference_id":"d2211e6e34d0755f35e2f8c22d81999fa81cfc71","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:57:36Z/"}],"url":"https://git.kernel.org/stable/c/d2211e6e34d0755f35e2f8c22d81999fa81cfc71"},{"reference_url":"https://git.kernel.org/stable/c/da22ca1ad548429d7822011c54cfe210718e0aa7","reference_id":"da22ca1ad548429d7822011c54cfe210718e0aa7","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:57:36Z/"}],"url":"https://git.kernel.org/stable/c/da22ca1ad548429d7822011c54cfe210718e0aa7"},{"reference_url":"https://git.kernel.org/stable/c/e6faac3f58c7c4176b66f63def17a34232a17b0e","reference_id":"e6faac3f58c7c4176b66f63def17a34232a17b0e","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:57:36Z/"}],"url":"https://git.kernel.org/stable/c/e6faac3f58c7c4176b66f63def17a34232a17b0e"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5266","reference_id":"RHSA-2024:5266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5281","reference_id":"RHSA-2024:5281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5282","reference_id":"RHSA-2024:5282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6992","reference_id":"RHSA-2024:6992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6992"}],"fixed_packages":[],"aliases":["CVE-2022-48828"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ykys-9qqs-vqbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74678?format=json","vulnerability_id":"VCID-z4bt-22ub-wqbs","summary":"kernel: virtio-net: tap: mlx5_core short frame denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41090.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41090.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-41090","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03108","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02995","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02983","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03003","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03024","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0306","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03071","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03077","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02898","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02922","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02923","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02918","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0289","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02871","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02881","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-41090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42232","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42232"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42236","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42236"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42247","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42247"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2299240","reference_id":"2299240","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2299240"},{"reference_url":"https://git.kernel.org/stable/c/73d462a38d5f782b7c872fe9ae8393d9ef5483da","reference_id":"73d462a38d5f782b7c872fe9ae8393d9ef5483da","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:59Z/"}],"url":"https://git.kernel.org/stable/c/73d462a38d5f782b7c872fe9ae8393d9ef5483da"},{"reference_url":"https://git.kernel.org/stable/c/7431144b406ae82807eb87d8c98e518475b0450f","reference_id":"7431144b406ae82807eb87d8c98e518475b0450f","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:59Z/"}],"url":"https://git.kernel.org/stable/c/7431144b406ae82807eb87d8c98e518475b0450f"},{"reference_url":"https://git.kernel.org/stable/c/8be915fc5ff9a5e296f6538be12ea75a1a93bdea","reference_id":"8be915fc5ff9a5e296f6538be12ea75a1a93bdea","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:59Z/"}],"url":"https://git.kernel.org/stable/c/8be915fc5ff9a5e296f6538be12ea75a1a93bdea"},{"reference_url":"https://git.kernel.org/stable/c/aa6a5704cab861c9b2ae9f475076e1881e87f5aa","reference_id":"aa6a5704cab861c9b2ae9f475076e1881e87f5aa","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:59Z/"}],"url":"https://git.kernel.org/stable/c/aa6a5704cab861c9b2ae9f475076e1881e87f5aa"},{"reference_url":"https://git.kernel.org/stable/c/e1a786b9bbb767fd1c922d424aaa8078cc542309","reference_id":"e1a786b9bbb767fd1c922d424aaa8078cc542309","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:59Z/"}],"url":"https://git.kernel.org/stable/c/e1a786b9bbb767fd1c922d424aaa8078cc542309"},{"reference_url":"https://git.kernel.org/stable/c/e5e5e63c506b93b89b01f522b6a7343585f784e6","reference_id":"e5e5e63c506b93b89b01f522b6a7343585f784e6","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:59Z/"}],"url":"https://git.kernel.org/stable/c/e5e5e63c506b93b89b01f522b6a7343585f784e6"},{"reference_url":"https://git.kernel.org/stable/c/ed7f2afdd0e043a397677e597ced0830b83ba0b3","reference_id":"ed7f2afdd0e043a397677e597ced0830b83ba0b3","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:59Z/"}],"url":"https://git.kernel.org/stable/c/ed7f2afdd0e043a397677e597ced0830b83ba0b3"},{"reference_url":"https://git.kernel.org/stable/c/ee93e6da30377cf2a75e16cd32bb9fcd86a61c46","reference_id":"ee93e6da30377cf2a75e16cd32bb9fcd86a61c46","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:24:59Z/"}],"url":"https://git.kernel.org/stable/c/ee93e6da30377cf2a75e16cd32bb9fcd86a61c46"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5256","reference_id":"RHSA-2024:5256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5257","reference_id":"RHSA-2024:5257","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5257"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5281","reference_id":"RHSA-2024:5281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5582","reference_id":"RHSA-2024:5582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5672","reference_id":"RHSA-2024:5672","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5672"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5673","reference_id":"RHSA-2024:5673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5673"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5858","reference_id":"RHSA-2024:5858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5928","reference_id":"RHSA-2024:5928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6156","reference_id":"RHSA-2024:6156","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6156"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6160","reference_id":"RHSA-2024:6160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6160"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6206","reference_id":"RHSA-2024:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6242","reference_id":"RHSA-2024:6242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6313","reference_id":"RHSA-2024:6313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6313"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6560","reference_id":"RHSA-2024:6560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6663","reference_id":"RHSA-2024:6663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6992","reference_id":"RHSA-2024:6992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7000","reference_id":"RHSA-2024:7000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7001","reference_id":"RHSA-2024:7001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7429","reference_id":"RHSA-2024:7429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7429"},{"reference_url":"https://usn.ubuntu.com/7088-1/","reference_id":"USN-7088-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-1/"},{"reference_url":"https://usn.ubuntu.com/7088-2/","reference_id":"USN-7088-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-2/"},{"reference_url":"https://usn.ubuntu.com/7088-3/","reference_id":"USN-7088-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-3/"},{"reference_url":"https://usn.ubuntu.com/7088-4/","reference_id":"USN-7088-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-4/"},{"reference_url":"https://usn.ubuntu.com/7088-5/","reference_id":"USN-7088-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7088-5/"},{"reference_url":"https://usn.ubuntu.com/7089-1/","reference_id":"USN-7089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-1/"},{"reference_url":"https://usn.ubuntu.com/7089-2/","reference_id":"USN-7089-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-2/"},{"reference_url":"https://usn.ubuntu.com/7089-3/","reference_id":"USN-7089-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-3/"},{"reference_url":"https://usn.ubuntu.com/7089-4/","reference_id":"USN-7089-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-4/"},{"reference_url":"https://usn.ubuntu.com/7089-5/","reference_id":"USN-7089-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-5/"},{"reference_url":"https://usn.ubuntu.com/7089-6/","reference_id":"USN-7089-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-6/"},{"reference_url":"https://usn.ubuntu.com/7089-7/","reference_id":"USN-7089-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7089-7/"},{"reference_url":"https://usn.ubuntu.com/7090-1/","reference_id":"USN-7090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7090-1/"},{"reference_url":"https://usn.ubuntu.com/7095-1/","reference_id":"USN-7095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7095-1/"},{"reference_url":"https://usn.ubuntu.com/7100-1/","reference_id":"USN-7100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7100-1/"},{"reference_url":"https://usn.ubuntu.com/7100-2/","reference_id":"USN-7100-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7100-2/"},{"reference_url":"https://usn.ubuntu.com/7119-1/","reference_id":"USN-7119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7119-1/"},{"reference_url":"https://usn.ubuntu.com/7123-1/","reference_id":"USN-7123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7123-1/"},{"reference_url":"https://usn.ubuntu.com/7144-1/","reference_id":"USN-7144-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7144-1/"},{"reference_url":"https://usn.ubuntu.com/7156-1/","reference_id":"USN-7156-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7156-1/"},{"reference_url":"https://usn.ubuntu.com/7194-1/","reference_id":"USN-7194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7194-1/"}],"fixed_packages":[],"aliases":["CVE-2024-41090"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z4bt-22ub-wqbs"}],"fixing_vulnerabilities":[],"risk_score":"3.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-193.141.1%3Farch=el8_2"}