{"url":"http://public2.vulnerablecode.io/api/packages/88556?format=json","purl":"pkg:rpm/redhat/kernel@4.18.0-372.64.1?arch=el8_6","type":"rpm","namespace":"redhat","name":"kernel","version":"4.18.0-372.64.1","qualifiers":{"arch":"el8_6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67491?format=json","vulnerability_id":"VCID-1et7-qezd-1bea","summary":"kernel: net: sched: fix memory leak in tcindex_set_parms","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50396.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50396.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50396","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02356","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02341","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02342","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02355","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02378","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02352","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03469","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03416","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03454","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0341","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03405","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03419","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03301","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03291","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03517","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03481","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03432","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03474","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50396"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/01d0d2b8b4e3cf2110baba9371c0c3d04ad5c77b","reference_id":"01d0d2b8b4e3cf2110baba9371c0c3d04ad5c77b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/01d0d2b8b4e3cf2110baba9371c0c3d04ad5c77b"},{"reference_url":"https://git.kernel.org/stable/c/18c3fa7a7fdbb4d21dafc8a7710ae2c1680930f6","reference_id":"18c3fa7a7fdbb4d21dafc8a7710ae2c1680930f6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/18c3fa7a7fdbb4d21dafc8a7710ae2c1680930f6"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396378","reference_id":"2396378","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396378"},{"reference_url":"https://git.kernel.org/stable/c/372ae77cf11d11fb118cbe2d37def9dd5f826abd","reference_id":"372ae77cf11d11fb118cbe2d37def9dd5f826abd","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/372ae77cf11d11fb118cbe2d37def9dd5f826abd"},{"reference_url":"https://git.kernel.org/stable/c/399ab7fe0fa0d846881685fd4e57e9a8ef7559f7","reference_id":"399ab7fe0fa0d846881685fd4e57e9a8ef7559f7","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/399ab7fe0fa0d846881685fd4e57e9a8ef7559f7"},{"reference_url":"https://git.kernel.org/stable/c/3abebc503a5148072052c229c6b04b329a420ecd","reference_id":"3abebc503a5148072052c229c6b04b329a420ecd","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/3abebc503a5148072052c229c6b04b329a420ecd"},{"reference_url":"https://git.kernel.org/stable/c/53af9c793f644d5841d84d8e0ad83bd7ab47f3e0","reference_id":"53af9c793f644d5841d84d8e0ad83bd7ab47f3e0","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/53af9c793f644d5841d84d8e0ad83bd7ab47f3e0"},{"reference_url":"https://git.kernel.org/stable/c/55ac68b53f1cea1926ee2313afc5d66b91daad71","reference_id":"55ac68b53f1cea1926ee2313afc5d66b91daad71","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/55ac68b53f1cea1926ee2313afc5d66b91daad71"},{"reference_url":"https://git.kernel.org/stable/c/6c55953e232ea668731091d111066521f3b7719b","reference_id":"6c55953e232ea668731091d111066521f3b7719b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/6c55953e232ea668731091d111066521f3b7719b"},{"reference_url":"https://git.kernel.org/stable/c/7a6fb69bbcb21e9ce13bdf18c008c268874f0480","reference_id":"7a6fb69bbcb21e9ce13bdf18c008c268874f0480","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/7a6fb69bbcb21e9ce13bdf18c008c268874f0480"},{"reference_url":"https://git.kernel.org/stable/c/7c183dc0af472dec33d2c0786a5e356baa8cad19","reference_id":"7c183dc0af472dec33d2c0786a5e356baa8cad19","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/7c183dc0af472dec33d2c0786a5e356baa8cad19"},{"reference_url":"https://git.kernel.org/stable/c/b314f6c3512108d7a656c5caf07c82d1bbbdc0f1","reference_id":"b314f6c3512108d7a656c5caf07c82d1bbbdc0f1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/b314f6c3512108d7a656c5caf07c82d1bbbdc0f1"},{"reference_url":"https://git.kernel.org/stable/c/c4de6057e7c6654983acb63d939d26ac0d7bbf39","reference_id":"c4de6057e7c6654983acb63d939d26ac0d7bbf39","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/c4de6057e7c6654983acb63d939d26ac0d7bbf39"},{"reference_url":"https://git.kernel.org/stable/c/facc4405e8b7407e03216207b1d1d640127de0c8","reference_id":"facc4405e8b7407e03216207b1d1d640127de0c8","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/"}],"url":"https://git.kernel.org/stable/c/facc4405e8b7407e03216207b1d1d640127de0c8"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4130","reference_id":"RHSA-2023:4130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"}],"fixed_packages":[],"aliases":["CVE-2022-50396"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1et7-qezd-1bea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78451?format=json","vulnerability_id":"VCID-uqu9-hbxy-kqeh","summary":"kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32233.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32233.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32233","reference_id":"","reference_type":"","scores":[{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.69013","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68969","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71521","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71437","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71455","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71429","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.7147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71482","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71504","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71488","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71515","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71561","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71971","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71926","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00695","scoring_system":"epss","scoring_elements":"0.71976","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72313","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72606","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72579","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.7266","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196105","reference_id":"2196105","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196105"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/05/08/4","reference_id":"4","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/05/08/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/05/15/5","reference_id":"5","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/05/15/5"},{"reference_url":"https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab","reference_id":"c1592a89942e9678f7d9c8030efa777c0d57edab","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab"},{"reference_url":"https://www.debian.org/security/2023/dsa-5402","reference_id":"dsa-5402","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://www.debian.org/security/2023/dsa-5402"},{"reference_url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab","reference_id":"?id=c1592a89942e9678f7d9c8030efa777c0d57edab","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab"},{"reference_url":"https://news.ycombinator.com/item?id=35879660","reference_id":"item?id=35879660","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://news.ycombinator.com/item?id=35879660"},{"reference_url":"http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0095-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230616-0002/","reference_id":"ntap-20230616-0002","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230616-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3349","reference_id":"RHSA-2023:3349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3350","reference_id":"RHSA-2023:3350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3351","reference_id":"RHSA-2023:3351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3465","reference_id":"RHSA-2023:3465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3470","reference_id":"RHSA-2023:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3490","reference_id":"RHSA-2023:3490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3705","reference_id":"RHSA-2023:3705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3708","reference_id":"RHSA-2023:3708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3723","reference_id":"RHSA-2023:3723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3852","reference_id":"RHSA-2023:3852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3852"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3853","reference_id":"RHSA-2023:3853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3853"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4125","reference_id":"RHSA-2023:4125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4126","reference_id":"RHSA-2023:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4130","reference_id":"RHSA-2023:4130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4145","reference_id":"RHSA-2023:4145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4146","reference_id":"RHSA-2023:4146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4255","reference_id":"RHSA-2023:4255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4256","reference_id":"RHSA-2023:4256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4262","reference_id":"RHSA-2023:4262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4262"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4696","reference_id":"RHSA-2023:4696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4699","reference_id":"RHSA-2023:4699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5419","reference_id":"RHSA-2023:5419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5574","reference_id":"RHSA-2023:5574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5621","reference_id":"RHSA-2023:5621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5622","reference_id":"RHSA-2023:5622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5622"},{"reference_url":"https://usn.ubuntu.com/6122-1/","reference_id":"USN-6122-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6122-1/"},{"reference_url":"https://usn.ubuntu.com/6123-1/","reference_id":"USN-6123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6123-1/"},{"reference_url":"https://usn.ubuntu.com/6124-1/","reference_id":"USN-6124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6124-1/"},{"reference_url":"https://usn.ubuntu.com/6127-1/","reference_id":"USN-6127-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6127-1/"},{"reference_url":"https://usn.ubuntu.com/6130-1/","reference_id":"USN-6130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6130-1/"},{"reference_url":"https://usn.ubuntu.com/6131-1/","reference_id":"USN-6131-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6131-1/"},{"reference_url":"https://usn.ubuntu.com/6132-1/","reference_id":"USN-6132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6132-1/"},{"reference_url":"https://usn.ubuntu.com/6135-1/","reference_id":"USN-6135-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6135-1/"},{"reference_url":"https://usn.ubuntu.com/6149-1/","reference_id":"USN-6149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6149-1/"},{"reference_url":"https://usn.ubuntu.com/6150-1/","reference_id":"USN-6150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6150-1/"},{"reference_url":"https://usn.ubuntu.com/6162-1/","reference_id":"USN-6162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6162-1/"},{"reference_url":"https://usn.ubuntu.com/6175-1/","reference_id":"USN-6175-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6175-1/"},{"reference_url":"https://usn.ubuntu.com/6186-1/","reference_id":"USN-6186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6186-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2023-32233"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uqu9-hbxy-kqeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78638?format=json","vulnerability_id":"VCID-va4k-cpus-nqdm","summary":"kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1281.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1281.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1281","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.04014","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03914","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03927","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0393","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03976","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03928","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03944","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03979","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03982","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03986","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03952","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03969","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03942","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0448","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04458","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0445","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04523","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04512","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04497","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2181847","reference_id":"2181847","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2181847"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/04/11/3","reference_id":"3","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/04/11/3"},{"reference_url":"https://kernel.dance/#ee059170b1f7e94e55fa6cadee544e176a6e59c2","reference_id":"#ee059170b1f7e94e55fa6cadee544e176a6e59c2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/"}],"url":"https://kernel.dance/#ee059170b1f7e94e55fa6cadee544e176a6e59c2"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2","reference_id":"?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0004/","reference_id":"ntap-20230427-0004","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3852","reference_id":"RHSA-2023:3852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3852"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3853","reference_id":"RHSA-2023:3853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3853"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4125","reference_id":"RHSA-2023:4125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4126","reference_id":"RHSA-2023:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4130","reference_id":"RHSA-2023:4130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4145","reference_id":"RHSA-2023:4145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4146","reference_id":"RHSA-2023:4146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4255","reference_id":"RHSA-2023:4255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4256","reference_id":"RHSA-2023:4256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4262","reference_id":"RHSA-2023:4262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4262"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4517","reference_id":"RHSA-2023:4517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4531","reference_id":"RHSA-2023:4531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4541","reference_id":"RHSA-2023:4541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4541"},{"reference_url":"https://usn.ubuntu.com/5977-1/","reference_id":"USN-5977-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5977-1/"},{"reference_url":"https://usn.ubuntu.com/5978-1/","reference_id":"USN-5978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5978-1/"},{"reference_url":"https://usn.ubuntu.com/6024-1/","reference_id":"USN-6024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6024-1/"},{"reference_url":"https://usn.ubuntu.com/6025-1/","reference_id":"USN-6025-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6025-1/"},{"reference_url":"https://usn.ubuntu.com/6027-1/","reference_id":"USN-6027-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6027-1/"},{"reference_url":"https://usn.ubuntu.com/6029-1/","reference_id":"USN-6029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6029-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6031-1/","reference_id":"USN-6031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6031-1/"},{"reference_url":"https://usn.ubuntu.com/6040-1/","reference_id":"USN-6040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6040-1/"},{"reference_url":"https://usn.ubuntu.com/6057-1/","reference_id":"USN-6057-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6057-1/"},{"reference_url":"https://usn.ubuntu.com/6093-1/","reference_id":"USN-6093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6093-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1281"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-va4k-cpus-nqdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67154?format=json","vulnerability_id":"VCID-zex7-kjeu-4ugv","summary":"kernel: scsi: qla2xxx: Fix crash when I/O abort times out","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50493.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50493.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50493","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04505","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04507","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.045","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04502","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50493"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401516","reference_id":"2401516","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4130","reference_id":"RHSA-2023:4130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4130"}],"fixed_packages":[],"aliases":["CVE-2022-50493"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zex7-kjeu-4ugv"}],"fixing_vulnerabilities":[],"risk_score":"3.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.64.1%3Farch=el8_6"}