{"url":"http://public2.vulnerablecode.io/api/packages/88747?format=json","purl":"pkg:rpm/redhat/kernel-rt@4.18.0-553.83.1.rt7.424?arch=el8_10","type":"rpm","namespace":"redhat","name":"kernel-rt","version":"4.18.0-553.83.1.rt7.424","qualifiers":{"arch":"el8_10"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67921?format=json","vulnerability_id":"VCID-69m3-8198-jbb5","summary":"kernel: mm: fix zswap writeback race condition","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53178.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53178.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53178","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01192","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.012","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01208","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01215","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01219","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01395","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01396","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01387","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01401","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01487","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01495","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01504","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01491","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01485","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01479","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01475","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53178"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395358","reference_id":"2395358","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395358"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9315","reference_id":"RHSA-2024:9315","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9315"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19886","reference_id":"RHSA-2025:19886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19931","reference_id":"RHSA-2025:19931","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19931"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19932","reference_id":"RHSA-2025:19932","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19932"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21051","reference_id":"RHSA-2025:21051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21083","reference_id":"RHSA-2025:21083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21084","reference_id":"RHSA-2025:21084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21091","reference_id":"RHSA-2025:21091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21128","reference_id":"RHSA-2025:21128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21136","reference_id":"RHSA-2025:21136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23445","reference_id":"RHSA-2025:23445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23947","reference_id":"RHSA-2025:23947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23960","reference_id":"RHSA-2025:23960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23960"}],"fixed_packages":[],"aliases":["CVE-2023-53178"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-69m3-8198-jbb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68011?format=json","vulnerability_id":"VCID-9aq6-tyaw-nuck","summary":"kernel: x86/vmscape: Add conditional IBPB mitigation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40300.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40300.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40300","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06071","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06099","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07282","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07272","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07202","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07196","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07322","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07281","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07289","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0726","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07498","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07481","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07497","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07219","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07273","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40300"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2394627","reference_id":"2394627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2394627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19930","reference_id":"RHSA-2025:19930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19931","reference_id":"RHSA-2025:19931","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19931"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19932","reference_id":"RHSA-2025:19932","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19932"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21112","reference_id":"RHSA-2025:21112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21118","reference_id":"RHSA-2025:21118","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21118"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21760","reference_id":"RHSA-2025:21760","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21760"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22006","reference_id":"RHSA-2025:22006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22066","reference_id":"RHSA-2025:22066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22072","reference_id":"RHSA-2025:22072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22087","reference_id":"RHSA-2025:22087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22087"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22095","reference_id":"RHSA-2025:22095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22124","reference_id":"RHSA-2025:22124","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0271","reference_id":"RHSA-2026:0271","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0271"},{"reference_url":"https://usn.ubuntu.com/7850-1/","reference_id":"USN-7850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7850-1/"},{"reference_url":"https://usn.ubuntu.com/7853-1/","reference_id":"USN-7853-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7853-1/"},{"reference_url":"https://usn.ubuntu.com/7853-2/","reference_id":"USN-7853-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7853-2/"},{"reference_url":"https://usn.ubuntu.com/7853-3/","reference_id":"USN-7853-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7853-3/"},{"reference_url":"https://usn.ubuntu.com/7854-1/","reference_id":"USN-7854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7854-1/"},{"reference_url":"https://usn.ubuntu.com/7860-1/","reference_id":"USN-7860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7860-1/"},{"reference_url":"https://usn.ubuntu.com/7860-2/","reference_id":"USN-7860-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7860-2/"},{"reference_url":"https://usn.ubuntu.com/7860-3/","reference_id":"USN-7860-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7860-3/"},{"reference_url":"https://usn.ubuntu.com/7860-4/","reference_id":"USN-7860-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7860-4/"},{"reference_url":"https://usn.ubuntu.com/7860-5/","reference_id":"USN-7860-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7860-5/"},{"reference_url":"https://usn.ubuntu.com/7861-1/","reference_id":"USN-7861-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7861-1/"},{"reference_url":"https://usn.ubuntu.com/7861-2/","reference_id":"USN-7861-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7861-2/"},{"reference_url":"https://usn.ubuntu.com/7861-3/","reference_id":"USN-7861-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7861-3/"},{"reference_url":"https://usn.ubuntu.com/7861-4/","reference_id":"USN-7861-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7861-4/"},{"reference_url":"https://usn.ubuntu.com/7861-5/","reference_id":"USN-7861-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7861-5/"},{"reference_url":"https://usn.ubuntu.com/7862-1/","reference_id":"USN-7862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7862-1/"},{"reference_url":"https://usn.ubuntu.com/7862-2/","reference_id":"USN-7862-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7862-2/"},{"reference_url":"https://usn.ubuntu.com/7862-3/","reference_id":"USN-7862-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7862-3/"},{"reference_url":"https://usn.ubuntu.com/7863-1/","reference_id":"USN-7863-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7863-1/"},{"reference_url":"https://usn.ubuntu.com/7864-1/","reference_id":"USN-7864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7864-1/"},{"reference_url":"https://usn.ubuntu.com/7865-1/","reference_id":"USN-7865-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7865-1/"},{"reference_url":"https://usn.ubuntu.com/7874-1/","reference_id":"USN-7874-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7874-1/"},{"reference_url":"https://usn.ubuntu.com/7874-2/","reference_id":"USN-7874-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7874-2/"},{"reference_url":"https://usn.ubuntu.com/7874-3/","reference_id":"USN-7874-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7874-3/"},{"reference_url":"https://usn.ubuntu.com/7875-1/","reference_id":"USN-7875-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7875-1/"},{"reference_url":"https://usn.ubuntu.com/7910-1/","reference_id":"USN-7910-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7910-1/"},{"reference_url":"https://usn.ubuntu.com/7910-2/","reference_id":"USN-7910-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7910-2/"},{"reference_url":"https://usn.ubuntu.com/7933-1/","reference_id":"USN-7933-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7933-1/"},{"reference_url":"https://usn.ubuntu.com/7934-1/","reference_id":"USN-7934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7934-1/"},{"reference_url":"https://usn.ubuntu.com/7935-1/","reference_id":"USN-7935-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7935-1/"},{"reference_url":"https://usn.ubuntu.com/7937-1/","reference_id":"USN-7937-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7937-1/"},{"reference_url":"https://usn.ubuntu.com/7938-1/","reference_id":"USN-7938-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7938-1/"},{"reference_url":"https://usn.ubuntu.com/7939-1/","reference_id":"USN-7939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7939-1/"},{"reference_url":"https://usn.ubuntu.com/7939-2/","reference_id":"USN-7939-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7939-2/"},{"reference_url":"https://usn.ubuntu.com/7940-1/","reference_id":"USN-7940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7940-1/"},{"reference_url":"https://usn.ubuntu.com/7940-2/","reference_id":"USN-7940-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7940-2/"}],"fixed_packages":[],"aliases":["CVE-2025-40300"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9aq6-tyaw-nuck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67628?format=json","vulnerability_id":"VCID-ar7y-h877-ckfu","summary":"kernel: fs: fix UAF/GPF bug in nilfs_mdt_destroy","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50367.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50367.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50367","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01825","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01808","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01807","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01888","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01881","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01877","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01916","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0187","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01856","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01871","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01928","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01912","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01927","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01942","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50367"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/1e555c3ed1fce4b278aaebe18a64a934cece57d8","reference_id":"1e555c3ed1fce4b278aaebe18a64a934cece57d8","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:35:10Z/"}],"url":"https://git.kernel.org/stable/c/1e555c3ed1fce4b278aaebe18a64a934cece57d8"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396114","reference_id":"2396114","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396114"},{"reference_url":"https://git.kernel.org/stable/c/2a96b532098284ecf8e4849b8b9e5fc7a28bdee9","reference_id":"2a96b532098284ecf8e4849b8b9e5fc7a28bdee9","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:35:10Z/"}],"url":"https://git.kernel.org/stable/c/2a96b532098284ecf8e4849b8b9e5fc7a28bdee9"},{"reference_url":"https://git.kernel.org/stable/c/2e488f13755ffbb60f307e991b27024716a33b29","reference_id":"2e488f13755ffbb60f307e991b27024716a33b29","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:35:10Z/"}],"url":"https://git.kernel.org/stable/c/2e488f13755ffbb60f307e991b27024716a33b29"},{"reference_url":"https://git.kernel.org/stable/c/64b79e632869ad3ef6c098a4731d559381da1115","reference_id":"64b79e632869ad3ef6c098a4731d559381da1115","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:35:10Z/"}],"url":"https://git.kernel.org/stable/c/64b79e632869ad3ef6c098a4731d559381da1115"},{"reference_url":"https://git.kernel.org/stable/c/70e4f70d54e0225f91814e8610477d65f33cefe4","reference_id":"70e4f70d54e0225f91814e8610477d65f33cefe4","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:35:10Z/"}],"url":"https://git.kernel.org/stable/c/70e4f70d54e0225f91814e8610477d65f33cefe4"},{"reference_url":"https://git.kernel.org/stable/c/81de80330fa6907aec32eb54c5619059e6e36452","reference_id":"81de80330fa6907aec32eb54c5619059e6e36452","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:35:10Z/"}],"url":"https://git.kernel.org/stable/c/81de80330fa6907aec32eb54c5619059e6e36452"},{"reference_url":"https://git.kernel.org/stable/c/c0aa76b0f17f59dd9c9d3463550a2986a1d592e4","reference_id":"c0aa76b0f17f59dd9c9d3463550a2986a1d592e4","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:35:10Z/"}],"url":"https://git.kernel.org/stable/c/c0aa76b0f17f59dd9c9d3463550a2986a1d592e4"},{"reference_url":"https://git.kernel.org/stable/c/d1ff475d7c83289d0a7faef346ea3bbf90818bad","reference_id":"d1ff475d7c83289d0a7faef346ea3bbf90818bad","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:35:10Z/"}],"url":"https://git.kernel.org/stable/c/d1ff475d7c83289d0a7faef346ea3bbf90818bad"},{"reference_url":"https://git.kernel.org/stable/c/ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48","reference_id":"ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:35:10Z/"}],"url":"https://git.kernel.org/stable/c/ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19409","reference_id":"RHSA-2025:19409","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19409"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19886","reference_id":"RHSA-2025:19886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19931","reference_id":"RHSA-2025:19931","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19931"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19932","reference_id":"RHSA-2025:19932","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19932"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21051","reference_id":"RHSA-2025:21051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21083","reference_id":"RHSA-2025:21083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21084","reference_id":"RHSA-2025:21084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21091","reference_id":"RHSA-2025:21091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21112","reference_id":"RHSA-2025:21112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21128","reference_id":"RHSA-2025:21128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21136","reference_id":"RHSA-2025:21136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23445","reference_id":"RHSA-2025:23445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23947","reference_id":"RHSA-2025:23947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23960","reference_id":"RHSA-2025:23960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23960"}],"fixed_packages":[],"aliases":["CVE-2022-50367"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ar7y-h877-ckfu"}],"fixing_vulnerabilities":[],"risk_score":"3.3","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@4.18.0-553.83.1.rt7.424%3Farch=el8_10"}