{"url":"http://public2.vulnerablecode.io/api/packages/89010?format=json","purl":"pkg:rpm/redhat/kernel@4.18.0-372.164.1?arch=el8_6","type":"rpm","namespace":"redhat","name":"kernel","version":"4.18.0-372.164.1","qualifiers":{"arch":"el8_6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69256?format=json","vulnerability_id":"VCID-2nk6-r6ff-x3db","summary":"kernel: bpf: Don't use tnum_range on array range checking for poke descriptors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49985.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49985.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49985","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06949","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06948","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06937","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06814","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06864","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20581","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20558","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20572","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20654","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20659","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20675","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20563","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20529","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20422","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20493","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49985"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49985","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49985"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373540","reference_id":"2373540","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15471","reference_id":"RHSA-2025:15471","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15472","reference_id":"RHSA-2025:15472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17570","reference_id":"RHSA-2025:17570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18043","reference_id":"RHSA-2025:18043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5693","reference_id":"RHSA-2026:5693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5693"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5732","reference_id":"RHSA-2026:5732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5732"}],"fixed_packages":[],"aliases":["CVE-2022-49985"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2nk6-r6ff-x3db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/25738?format=json","vulnerability_id":"VCID-6h1q-xus4-4qcs","summary":"podman kube play symlink traversal vulnerability\n### Impact\n\nThe podman kube play command can overwrite host files when the kube file contains a ConfigMap or Secret volume mount and the volume already contains a symlink to a host file.\nThis allows a malicious container to write to arbitrary files on the host BUT the attacker only controls the target path not the contents that will be written to the file. The contents are defined in the yaml file by the end user.\n\n### Requirements to exploit:\npodman kube play must be used with a ConfigMap or Secret volume mount AND must be run more than once on the same volume. All the attacker has to do is create the malicious symlink on the volume the first time it is started. After that all following starts would follow the symlink and write to the host location. \n\n\n### Patches\nFixed in podman v5.6.1\nhttps://github.com/containers/podman/commit/43fbde4e665fe6cee6921868f04b7ccd3de5ad89\n\n### Workarounds\n\nDon't use podman kube play with ConfigMap or Secret volume mounts.\n\n### PR with test for CI\n\nAdding on 9/8/2025 by @TomSweeneyRedHat , this is the PR containing the test in CI: https://github.com/containers/podman/pull/27001","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2025:15692","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHBA-2025:15692"},{"reference_url":"https://access.redhat.com/errata/RHBA-2025:15712","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHBA-2025:15712"},{"reference_url":"https://access.redhat.com/errata/RHBA-2025:16158","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHBA-2025:16158"},{"reference_url":"https://access.redhat.com/errata/RHBA-2025:16163","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHBA-2025:16163"},{"reference_url":"https://access.redhat.com/errata/RHEA-2025:4782","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHEA-2025:4782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15900","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:15900"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15901","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:15901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15904","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:15904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16480","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:16480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16481","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:16481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16482","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:16482"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16488","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:16488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16515","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:16515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16724","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:16724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17669","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:17669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18217","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:18217"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18218","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:18218"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18240","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:18240"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19002","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19041","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19046","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19094","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19094"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19894","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:19894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20909","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20983","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20983"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9566.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9566.json"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-9566","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-9566"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-9566","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13466","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16638","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17057","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16813","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16831","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1689","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16887","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1695","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16862","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17011","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16756","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17916","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1797","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17671","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17759","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17822","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18421","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18524","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1839","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18517","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-9566"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2393152","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2393152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9566"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/containers/podman","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/containers/podman"},{"reference_url":"https://github.com/containers/podman/commit/43fbde4e665fe6cee6921868f04b7ccd3de5ad89","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://github.com/containers/podman/commit/43fbde4e665fe6cee6921868f04b7ccd3de5ad89"},{"reference_url":"https://github.com/containers/podman/security/advisories/GHSA-wp3j-xq48-xpjw","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://github.com/containers/podman/security/advisories/GHSA-wp3j-xq48-xpjw"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2025-9566","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-9566"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1114526","reference_id":"1114526","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1114526"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1","reference_id":"cpe:/a:redhat:hummingbird:1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4","reference_id":"cpe:/a:redhat:openshift:4","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8","reference_id":"cpe:/a:redhat:openshift:4.12::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el9","reference_id":"cpe:/a:redhat:openshift:4.12::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9","reference_id":"cpe:/a:redhat:openshift:4.13::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el8","reference_id":"cpe:/a:redhat:openshift:4.14::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9","reference_id":"cpe:/a:redhat:openshift:4.14::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el8","reference_id":"cpe:/a:redhat:openshift:4.15::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9","reference_id":"cpe:/a:redhat:openshift:4.15::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el8","reference_id":"cpe:/a:redhat:openshift:4.16::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9","reference_id":"cpe:/a:redhat:openshift:4.16::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9","reference_id":"cpe:/a:redhat:openshift:4.17::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el8","reference_id":"cpe:/a:redhat:openshift:4.18::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9","reference_id":"cpe:/a:redhat:openshift:4.18::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9","reference_id":"cpe:/a:redhat:openshift:4.19::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.20::el8","reference_id":"cpe:/a:redhat:openshift:4.20::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.20::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.20::el9","reference_id":"cpe:/a:redhat:openshift:4.20::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.20::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_devspaces:3.24::el9","reference_id":"cpe:/a:redhat:openshift_devspaces:3.24::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_devspaces:3.24::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_ironic:4.20::el9","reference_id":"cpe:/a:redhat:openshift_ironic:4.20::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_ironic:4.20::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1","reference_id":"cpe:/o:redhat:enterprise_linux:10.1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8211","reference_id":"RHSA-2026:8211","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-05T20:16:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:8211"}],"fixed_packages":[],"aliases":["CVE-2025-9566","GHSA-wp3j-xq48-xpjw"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6h1q-xus4-4qcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69255?format=json","vulnerability_id":"VCID-9n5s-42gn-63f1","summary":"kernel: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50087.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50087.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50087","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06508","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06505","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06498","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06488","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06428","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19846","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19808","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19836","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19923","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19925","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19921","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19806","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19776","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19685","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19761","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50087","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50087"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373539","reference_id":"2373539","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16919","reference_id":"RHSA-2025:16919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16920","reference_id":"RHSA-2025:16920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17570","reference_id":"RHSA-2025:17570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17734","reference_id":"RHSA-2025:17734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17735","reference_id":"RHSA-2025:17735","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17735"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17958","reference_id":"RHSA-2025:17958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18043","reference_id":"RHSA-2025:18043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18054","reference_id":"RHSA-2025:18054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18098","reference_id":"RHSA-2025:18098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18281","reference_id":"RHSA-2025:18281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21112","reference_id":"RHSA-2025:21112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21667","reference_id":"RHSA-2025:21667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"}],"fixed_packages":[],"aliases":["CVE-2022-50087"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9n5s-42gn-63f1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68449?format=json","vulnerability_id":"VCID-abga-1vvy-2bfw","summary":"kernel: do_change_type(): refuse to operate on unmounted/not ours mounts","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38498.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38498.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38498","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08281","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08232","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08296","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08314","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08305","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08268","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08284","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09703","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0971","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10437","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10564","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10548","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10453","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12011","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11829","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11966","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1202","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11994","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12021","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11915","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38498"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2384422","reference_id":"2384422","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2384422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15782","reference_id":"RHSA-2025:15782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16372","reference_id":"RHSA-2025:16372","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16372"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16398","reference_id":"RHSA-2025:16398","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16398"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17570","reference_id":"RHSA-2025:17570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17734","reference_id":"RHSA-2025:17734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17958","reference_id":"RHSA-2025:17958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18043","reference_id":"RHSA-2025:18043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18054","reference_id":"RHSA-2025:18054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18098","reference_id":"RHSA-2025:18098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21118","reference_id":"RHSA-2025:21118","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21118"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21469","reference_id":"RHSA-2025:21469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21667","reference_id":"RHSA-2025:21667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://usn.ubuntu.com/7769-1/","reference_id":"USN-7769-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7769-1/"},{"reference_url":"https://usn.ubuntu.com/7769-2/","reference_id":"USN-7769-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7769-2/"},{"reference_url":"https://usn.ubuntu.com/7769-3/","reference_id":"USN-7769-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7769-3/"},{"reference_url":"https://usn.ubuntu.com/7770-1/","reference_id":"USN-7770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7770-1/"},{"reference_url":"https://usn.ubuntu.com/7771-1/","reference_id":"USN-7771-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7771-1/"},{"reference_url":"https://usn.ubuntu.com/7774-1/","reference_id":"USN-7774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-1/"},{"reference_url":"https://usn.ubuntu.com/7774-2/","reference_id":"USN-7774-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-2/"},{"reference_url":"https://usn.ubuntu.com/7774-3/","reference_id":"USN-7774-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-3/"},{"reference_url":"https://usn.ubuntu.com/7774-4/","reference_id":"USN-7774-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-4/"},{"reference_url":"https://usn.ubuntu.com/7774-5/","reference_id":"USN-7774-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-5/"},{"reference_url":"https://usn.ubuntu.com/7775-1/","reference_id":"USN-7775-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-1/"},{"reference_url":"https://usn.ubuntu.com/7775-2/","reference_id":"USN-7775-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-2/"},{"reference_url":"https://usn.ubuntu.com/7775-3/","reference_id":"USN-7775-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-3/"},{"reference_url":"https://usn.ubuntu.com/7776-1/","reference_id":"USN-7776-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7776-1/"},{"reference_url":"https://usn.ubuntu.com/7789-1/","reference_id":"USN-7789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7789-1/"},{"reference_url":"https://usn.ubuntu.com/7789-2/","reference_id":"USN-7789-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7789-2/"}],"fixed_packages":[],"aliases":["CVE-2025-38498"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-abga-1vvy-2bfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68865?format=json","vulnerability_id":"VCID-drf5-ur3k-gfee","summary":"kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38211.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38211.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38211","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06241","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06272","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06252","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06297","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06338","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06325","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06313","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06265","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06278","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06472","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06484","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06433","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06448","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19412","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19442","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19538","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19536","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19275","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19364","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19451","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38211"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376406","reference_id":"2376406","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376406"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15005","reference_id":"RHSA-2025:15005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15008","reference_id":"RHSA-2025:15008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15009","reference_id":"RHSA-2025:15009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15011","reference_id":"RHSA-2025:15011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15657","reference_id":"RHSA-2025:15657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15669","reference_id":"RHSA-2025:15669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16669","reference_id":"RHSA-2025:16669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17159","reference_id":"RHSA-2025:17159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17192","reference_id":"RHSA-2025:17192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17570","reference_id":"RHSA-2025:17570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18043","reference_id":"RHSA-2025:18043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21667","reference_id":"RHSA-2025:21667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://usn.ubuntu.com/7774-1/","reference_id":"USN-7774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-1/"},{"reference_url":"https://usn.ubuntu.com/7774-2/","reference_id":"USN-7774-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-2/"},{"reference_url":"https://usn.ubuntu.com/7774-3/","reference_id":"USN-7774-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-3/"},{"reference_url":"https://usn.ubuntu.com/7774-4/","reference_id":"USN-7774-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-4/"},{"reference_url":"https://usn.ubuntu.com/7774-5/","reference_id":"USN-7774-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-5/"},{"reference_url":"https://usn.ubuntu.com/7775-1/","reference_id":"USN-7775-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-1/"},{"reference_url":"https://usn.ubuntu.com/7775-2/","reference_id":"USN-7775-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-2/"},{"reference_url":"https://usn.ubuntu.com/7775-3/","reference_id":"USN-7775-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-3/"},{"reference_url":"https://usn.ubuntu.com/7776-1/","reference_id":"USN-7776-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7776-1/"},{"reference_url":"https://usn.ubuntu.com/7833-1/","reference_id":"USN-7833-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-1/"},{"reference_url":"https://usn.ubuntu.com/7833-2/","reference_id":"USN-7833-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-2/"},{"reference_url":"https://usn.ubuntu.com/7833-3/","reference_id":"USN-7833-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-3/"},{"reference_url":"https://usn.ubuntu.com/7833-4/","reference_id":"USN-7833-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-4/"},{"reference_url":"https://usn.ubuntu.com/7834-1/","reference_id":"USN-7834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7834-1/"},{"reference_url":"https://usn.ubuntu.com/7856-1/","reference_id":"USN-7856-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7856-1/"},{"reference_url":"https://usn.ubuntu.com/8028-1/","reference_id":"USN-8028-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-1/"},{"reference_url":"https://usn.ubuntu.com/8028-2/","reference_id":"USN-8028-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-2/"},{"reference_url":"https://usn.ubuntu.com/8028-3/","reference_id":"USN-8028-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-3/"},{"reference_url":"https://usn.ubuntu.com/8028-4/","reference_id":"USN-8028-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-4/"},{"reference_url":"https://usn.ubuntu.com/8028-5/","reference_id":"USN-8028-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-5/"},{"reference_url":"https://usn.ubuntu.com/8028-6/","reference_id":"USN-8028-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-6/"},{"reference_url":"https://usn.ubuntu.com/8028-7/","reference_id":"USN-8028-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-7/"},{"reference_url":"https://usn.ubuntu.com/8028-8/","reference_id":"USN-8028-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-8/"},{"reference_url":"https://usn.ubuntu.com/8031-1/","reference_id":"USN-8031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-1/"},{"reference_url":"https://usn.ubuntu.com/8031-2/","reference_id":"USN-8031-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-2/"},{"reference_url":"https://usn.ubuntu.com/8031-3/","reference_id":"USN-8031-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-3/"},{"reference_url":"https://usn.ubuntu.com/8052-1/","reference_id":"USN-8052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-1/"},{"reference_url":"https://usn.ubuntu.com/8052-2/","reference_id":"USN-8052-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-2/"},{"reference_url":"https://usn.ubuntu.com/8074-1/","reference_id":"USN-8074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-1/"},{"reference_url":"https://usn.ubuntu.com/8074-2/","reference_id":"USN-8074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-2/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"}],"fixed_packages":[],"aliases":["CVE-2025-38211"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-drf5-ur3k-gfee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68603?format=json","vulnerability_id":"VCID-ds3w-wph8-7kam","summary":"kernel: drm/gem: Acquire references on GEM handles for framebuffers","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38449.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38449.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38449","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02275","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0225","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02256","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02252","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03737","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03715","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03689","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04959","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04766","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.048","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04838","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04854","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0485","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04899","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04942","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04961","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04958","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38449","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38449"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383519","reference_id":"2383519","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15447","reference_id":"RHSA-2025:15447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15661","reference_id":"RHSA-2025:15661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15785","reference_id":"RHSA-2025:15785","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15786","reference_id":"RHSA-2025:15786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17122","reference_id":"RHSA-2025:17122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17123","reference_id":"RHSA-2025:17123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17159","reference_id":"RHSA-2025:17159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17192","reference_id":"RHSA-2025:17192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17241","reference_id":"RHSA-2025:17241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17570","reference_id":"RHSA-2025:17570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18043","reference_id":"RHSA-2025:18043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21667","reference_id":"RHSA-2025:21667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://usn.ubuntu.com/7879-1/","reference_id":"USN-7879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7879-1/"},{"reference_url":"https://usn.ubuntu.com/7879-2/","reference_id":"USN-7879-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7879-2/"},{"reference_url":"https://usn.ubuntu.com/7879-3/","reference_id":"USN-7879-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7879-3/"},{"reference_url":"https://usn.ubuntu.com/7879-4/","reference_id":"USN-7879-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7879-4/"},{"reference_url":"https://usn.ubuntu.com/7880-1/","reference_id":"USN-7880-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7880-1/"},{"reference_url":"https://usn.ubuntu.com/7934-1/","reference_id":"USN-7934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7934-1/"},{"reference_url":"https://usn.ubuntu.com/8028-1/","reference_id":"USN-8028-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-1/"},{"reference_url":"https://usn.ubuntu.com/8028-2/","reference_id":"USN-8028-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-2/"},{"reference_url":"https://usn.ubuntu.com/8028-3/","reference_id":"USN-8028-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-3/"},{"reference_url":"https://usn.ubuntu.com/8028-4/","reference_id":"USN-8028-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-4/"},{"reference_url":"https://usn.ubuntu.com/8028-5/","reference_id":"USN-8028-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-5/"},{"reference_url":"https://usn.ubuntu.com/8028-6/","reference_id":"USN-8028-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-6/"},{"reference_url":"https://usn.ubuntu.com/8028-7/","reference_id":"USN-8028-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-7/"},{"reference_url":"https://usn.ubuntu.com/8028-8/","reference_id":"USN-8028-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-8/"},{"reference_url":"https://usn.ubuntu.com/8031-1/","reference_id":"USN-8031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-1/"},{"reference_url":"https://usn.ubuntu.com/8031-2/","reference_id":"USN-8031-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-2/"},{"reference_url":"https://usn.ubuntu.com/8031-3/","reference_id":"USN-8031-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-3/"},{"reference_url":"https://usn.ubuntu.com/8052-1/","reference_id":"USN-8052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-1/"},{"reference_url":"https://usn.ubuntu.com/8052-2/","reference_id":"USN-8052-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-2/"},{"reference_url":"https://usn.ubuntu.com/8074-1/","reference_id":"USN-8074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-1/"},{"reference_url":"https://usn.ubuntu.com/8074-2/","reference_id":"USN-8074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-2/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"}],"fixed_packages":[],"aliases":["CVE-2025-38449"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ds3w-wph8-7kam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68598?format=json","vulnerability_id":"VCID-es4k-7j4u-qyah","summary":"kernel: vsock: Fix transport_* TOCTOU","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38461.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38461.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38461","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0262","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04194","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04254","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04238","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04215","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04184","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05379","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05183","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05209","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05252","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05244","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05293","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05337","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05373","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05372","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05376","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-38461"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38461","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38461"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383513","reference_id":"2383513","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383513"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15005","reference_id":"RHSA-2025:15005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15011","reference_id":"RHSA-2025:15011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16372","reference_id":"RHSA-2025:16372","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16372"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16373","reference_id":"RHSA-2025:16373","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16373"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16669","reference_id":"RHSA-2025:16669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17122","reference_id":"RHSA-2025:17122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17123","reference_id":"RHSA-2025:17123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17159","reference_id":"RHSA-2025:17159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17192","reference_id":"RHSA-2025:17192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18043","reference_id":"RHSA-2025:18043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18932","reference_id":"RHSA-2025:18932","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18932"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://usn.ubuntu.com/7774-1/","reference_id":"USN-7774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-1/"},{"reference_url":"https://usn.ubuntu.com/7774-2/","reference_id":"USN-7774-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-2/"},{"reference_url":"https://usn.ubuntu.com/7774-3/","reference_id":"USN-7774-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-3/"},{"reference_url":"https://usn.ubuntu.com/7774-4/","reference_id":"USN-7774-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-4/"},{"reference_url":"https://usn.ubuntu.com/7774-5/","reference_id":"USN-7774-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7774-5/"},{"reference_url":"https://usn.ubuntu.com/7775-1/","reference_id":"USN-7775-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-1/"},{"reference_url":"https://usn.ubuntu.com/7775-2/","reference_id":"USN-7775-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-2/"},{"reference_url":"https://usn.ubuntu.com/7775-3/","reference_id":"USN-7775-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7775-3/"},{"reference_url":"https://usn.ubuntu.com/7776-1/","reference_id":"USN-7776-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7776-1/"},{"reference_url":"https://usn.ubuntu.com/7879-1/","reference_id":"USN-7879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7879-1/"},{"reference_url":"https://usn.ubuntu.com/7879-2/","reference_id":"USN-7879-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7879-2/"},{"reference_url":"https://usn.ubuntu.com/7879-3/","reference_id":"USN-7879-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7879-3/"},{"reference_url":"https://usn.ubuntu.com/7879-4/","reference_id":"USN-7879-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7879-4/"},{"reference_url":"https://usn.ubuntu.com/7880-1/","reference_id":"USN-7880-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7880-1/"},{"reference_url":"https://usn.ubuntu.com/7934-1/","reference_id":"USN-7934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7934-1/"},{"reference_url":"https://usn.ubuntu.com/8028-1/","reference_id":"USN-8028-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-1/"},{"reference_url":"https://usn.ubuntu.com/8028-2/","reference_id":"USN-8028-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-2/"},{"reference_url":"https://usn.ubuntu.com/8028-3/","reference_id":"USN-8028-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-3/"},{"reference_url":"https://usn.ubuntu.com/8028-4/","reference_id":"USN-8028-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-4/"},{"reference_url":"https://usn.ubuntu.com/8028-5/","reference_id":"USN-8028-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-5/"},{"reference_url":"https://usn.ubuntu.com/8028-6/","reference_id":"USN-8028-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-6/"},{"reference_url":"https://usn.ubuntu.com/8028-7/","reference_id":"USN-8028-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-7/"},{"reference_url":"https://usn.ubuntu.com/8028-8/","reference_id":"USN-8028-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-8/"},{"reference_url":"https://usn.ubuntu.com/8031-1/","reference_id":"USN-8031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-1/"},{"reference_url":"https://usn.ubuntu.com/8031-2/","reference_id":"USN-8031-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-2/"},{"reference_url":"https://usn.ubuntu.com/8031-3/","reference_id":"USN-8031-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-3/"},{"reference_url":"https://usn.ubuntu.com/8052-1/","reference_id":"USN-8052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-1/"},{"reference_url":"https://usn.ubuntu.com/8052-2/","reference_id":"USN-8052-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-2/"},{"reference_url":"https://usn.ubuntu.com/8074-1/","reference_id":"USN-8074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-1/"},{"reference_url":"https://usn.ubuntu.com/8074-2/","reference_id":"USN-8074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-2/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"}],"fixed_packages":[],"aliases":["CVE-2025-38461"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-es4k-7j4u-qyah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70268?format=json","vulnerability_id":"VCID-f89z-k7xe-83e4","summary":"kernel: drm/vkms: Fix use after free and double free on init error","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22097.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22097.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-22097","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2219","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22007","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22157","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22177","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22136","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22076","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22069","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22024","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21882","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2187","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21857","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21764","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21837","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21914","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21883","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21906","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21988","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22239","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22022","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22102","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-22097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22097"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/1f68f1cf09d06061eb549726ff8339e064eddebd","reference_id":"1f68f1cf09d06061eb549726ff8339e064eddebd","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-25T14:30:06Z/"}],"url":"https://git.kernel.org/stable/c/1f68f1cf09d06061eb549726ff8339e064eddebd"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2360223","reference_id":"2360223","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2360223"},{"reference_url":"https://git.kernel.org/stable/c/49a69f67f53518bdd9b7eeebf019a2da6cc0e954","reference_id":"49a69f67f53518bdd9b7eeebf019a2da6cc0e954","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-25T14:30:06Z/"}],"url":"https://git.kernel.org/stable/c/49a69f67f53518bdd9b7eeebf019a2da6cc0e954"},{"reference_url":"https://git.kernel.org/stable/c/561fc0c5cf41f646f3e9e61784cbc0fc832fb936","reference_id":"561fc0c5cf41f646f3e9e61784cbc0fc832fb936","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-25T14:30:06Z/"}],"url":"https://git.kernel.org/stable/c/561fc0c5cf41f646f3e9e61784cbc0fc832fb936"},{"reference_url":"https://git.kernel.org/stable/c/79d138d137b80eeb0a83244d1cff29e64cf91067","reference_id":"79d138d137b80eeb0a83244d1cff29e64cf91067","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-25T14:30:06Z/"}],"url":"https://git.kernel.org/stable/c/79d138d137b80eeb0a83244d1cff29e64cf91067"},{"reference_url":"https://git.kernel.org/stable/c/b8a18bb53e06d6d3c1fd03d12533d6e333ba8853","reference_id":"b8a18bb53e06d6d3c1fd03d12533d6e333ba8853","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-25T14:30:06Z/"}],"url":"https://git.kernel.org/stable/c/b8a18bb53e06d6d3c1fd03d12533d6e333ba8853"},{"reference_url":"https://git.kernel.org/stable/c/d5eb8e347905ab17788a7903fa1d3d06747355f5","reference_id":"d5eb8e347905ab17788a7903fa1d3d06747355f5","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-25T14:30:06Z/"}],"url":"https://git.kernel.org/stable/c/d5eb8e347905ab17788a7903fa1d3d06747355f5"},{"reference_url":"https://git.kernel.org/stable/c/ed15511a773df86205bda66c37193569575ae828","reference_id":"ed15511a773df86205bda66c37193569575ae828","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-25T14:30:06Z/"}],"url":"https://git.kernel.org/stable/c/ed15511a773df86205bda66c37193569575ae828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13960","reference_id":"RHSA-2025:13960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13961","reference_id":"RHSA-2025:13961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15447","reference_id":"RHSA-2025:15447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15657","reference_id":"RHSA-2025:15657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15658","reference_id":"RHSA-2025:15658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15661","reference_id":"RHSA-2025:15661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15668","reference_id":"RHSA-2025:15668","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15668"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15669","reference_id":"RHSA-2025:15669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15670","reference_id":"RHSA-2025:15670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17009","reference_id":"RHSA-2025:17009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18043","reference_id":"RHSA-2025:18043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20518","reference_id":"RHSA-2025:20518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20518"},{"reference_url":"https://usn.ubuntu.com/7591-1/","reference_id":"USN-7591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-1/"},{"reference_url":"https://usn.ubuntu.com/7591-2/","reference_id":"USN-7591-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-2/"},{"reference_url":"https://usn.ubuntu.com/7591-3/","reference_id":"USN-7591-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-3/"},{"reference_url":"https://usn.ubuntu.com/7591-4/","reference_id":"USN-7591-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-4/"},{"reference_url":"https://usn.ubuntu.com/7591-5/","reference_id":"USN-7591-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-5/"},{"reference_url":"https://usn.ubuntu.com/7591-6/","reference_id":"USN-7591-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-6/"},{"reference_url":"https://usn.ubuntu.com/7592-1/","reference_id":"USN-7592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7592-1/"},{"reference_url":"https://usn.ubuntu.com/7593-1/","reference_id":"USN-7593-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7593-1/"},{"reference_url":"https://usn.ubuntu.com/7594-1/","reference_id":"USN-7594-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-1/"},{"reference_url":"https://usn.ubuntu.com/7594-2/","reference_id":"USN-7594-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-2/"},{"reference_url":"https://usn.ubuntu.com/7594-3/","reference_id":"USN-7594-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-3/"},{"reference_url":"https://usn.ubuntu.com/7597-1/","reference_id":"USN-7597-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7597-1/"},{"reference_url":"https://usn.ubuntu.com/7597-2/","reference_id":"USN-7597-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7597-2/"},{"reference_url":"https://usn.ubuntu.com/7598-1/","reference_id":"USN-7598-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7598-1/"},{"reference_url":"https://usn.ubuntu.com/7602-1/","reference_id":"USN-7602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7602-1/"},{"reference_url":"https://usn.ubuntu.com/7605-1/","reference_id":"USN-7605-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7605-1/"},{"reference_url":"https://usn.ubuntu.com/7605-2/","reference_id":"USN-7605-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7605-2/"},{"reference_url":"https://usn.ubuntu.com/7606-1/","reference_id":"USN-7606-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7606-1/"},{"reference_url":"https://usn.ubuntu.com/7628-1/","reference_id":"USN-7628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7628-1/"},{"reference_url":"https://usn.ubuntu.com/7655-1/","reference_id":"USN-7655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7655-1/"},{"reference_url":"https://usn.ubuntu.com/7835-1/","reference_id":"USN-7835-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7835-1/"},{"reference_url":"https://usn.ubuntu.com/7835-2/","reference_id":"USN-7835-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7835-2/"},{"reference_url":"https://usn.ubuntu.com/7835-3/","reference_id":"USN-7835-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7835-3/"},{"reference_url":"https://usn.ubuntu.com/7835-4/","reference_id":"USN-7835-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7835-4/"},{"reference_url":"https://usn.ubuntu.com/7835-5/","reference_id":"USN-7835-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7835-5/"},{"reference_url":"https://usn.ubuntu.com/7835-6/","reference_id":"USN-7835-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7835-6/"},{"reference_url":"https://usn.ubuntu.com/7887-1/","reference_id":"USN-7887-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7887-1/"},{"reference_url":"https://usn.ubuntu.com/7887-2/","reference_id":"USN-7887-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7887-2/"},{"reference_url":"https://usn.ubuntu.com/7940-1/","reference_id":"USN-7940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7940-1/"},{"reference_url":"https://usn.ubuntu.com/7940-2/","reference_id":"USN-7940-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7940-2/"}],"fixed_packages":[],"aliases":["CVE-2025-22097"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f89z-k7xe-83e4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69528?format=json","vulnerability_id":"VCID-kje2-4fqw-57gh","summary":"kernel: net_sched: ets: Fix double list add in class with netem as child qdisc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-37914.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-37914.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-37914","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25592","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25628","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25396","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25465","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25513","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25524","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25482","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25425","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25431","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25421","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25387","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25351","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25344","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25298","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25181","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25246","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25307","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2523","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25249","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25326","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25362","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-37914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37914"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2367500","reference_id":"2367500","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2367500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13960","reference_id":"RHSA-2025:13960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13961","reference_id":"RHSA-2025:13961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14420","reference_id":"RHSA-2025:14420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14510","reference_id":"RHSA-2025:14510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15668","reference_id":"RHSA-2025:15668","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15668"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17570","reference_id":"RHSA-2025:17570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17734","reference_id":"RHSA-2025:17734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17735","reference_id":"RHSA-2025:17735","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17735"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18043","reference_id":"RHSA-2025:18043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18054","reference_id":"RHSA-2025:18054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18098","reference_id":"RHSA-2025:18098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://usn.ubuntu.com/7649-1/","reference_id":"USN-7649-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7649-1/"},{"reference_url":"https://usn.ubuntu.com/7649-2/","reference_id":"USN-7649-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7649-2/"},{"reference_url":"https://usn.ubuntu.com/7650-1/","reference_id":"USN-7650-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7650-1/"},{"reference_url":"https://usn.ubuntu.com/7654-1/","reference_id":"USN-7654-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-1/"},{"reference_url":"https://usn.ubuntu.com/7654-2/","reference_id":"USN-7654-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-2/"},{"reference_url":"https://usn.ubuntu.com/7654-3/","reference_id":"USN-7654-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-3/"},{"reference_url":"https://usn.ubuntu.com/7654-4/","reference_id":"USN-7654-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-4/"},{"reference_url":"https://usn.ubuntu.com/7654-5/","reference_id":"USN-7654-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-5/"},{"reference_url":"https://usn.ubuntu.com/7655-1/","reference_id":"USN-7655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7655-1/"},{"reference_url":"https://usn.ubuntu.com/7665-1/","reference_id":"USN-7665-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7665-1/"},{"reference_url":"https://usn.ubuntu.com/7665-2/","reference_id":"USN-7665-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7665-2/"},{"reference_url":"https://usn.ubuntu.com/7686-1/","reference_id":"USN-7686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7686-1/"},{"reference_url":"https://usn.ubuntu.com/7711-1/","reference_id":"USN-7711-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7711-1/"},{"reference_url":"https://usn.ubuntu.com/7712-1/","reference_id":"USN-7712-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7712-1/"},{"reference_url":"https://usn.ubuntu.com/7712-2/","reference_id":"USN-7712-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7712-2/"},{"reference_url":"https://usn.ubuntu.com/7721-1/","reference_id":"USN-7721-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7721-1/"},{"reference_url":"https://usn.ubuntu.com/8028-1/","reference_id":"USN-8028-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-1/"},{"reference_url":"https://usn.ubuntu.com/8028-2/","reference_id":"USN-8028-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-2/"},{"reference_url":"https://usn.ubuntu.com/8028-3/","reference_id":"USN-8028-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-3/"},{"reference_url":"https://usn.ubuntu.com/8028-4/","reference_id":"USN-8028-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-4/"},{"reference_url":"https://usn.ubuntu.com/8028-5/","reference_id":"USN-8028-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-5/"},{"reference_url":"https://usn.ubuntu.com/8028-6/","reference_id":"USN-8028-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-6/"},{"reference_url":"https://usn.ubuntu.com/8028-7/","reference_id":"USN-8028-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-7/"},{"reference_url":"https://usn.ubuntu.com/8028-8/","reference_id":"USN-8028-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-8/"},{"reference_url":"https://usn.ubuntu.com/8031-1/","reference_id":"USN-8031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-1/"},{"reference_url":"https://usn.ubuntu.com/8031-2/","reference_id":"USN-8031-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-2/"},{"reference_url":"https://usn.ubuntu.com/8031-3/","reference_id":"USN-8031-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-3/"},{"reference_url":"https://usn.ubuntu.com/8052-1/","reference_id":"USN-8052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-1/"},{"reference_url":"https://usn.ubuntu.com/8052-2/","reference_id":"USN-8052-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-2/"},{"reference_url":"https://usn.ubuntu.com/8074-1/","reference_id":"USN-8074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-1/"},{"reference_url":"https://usn.ubuntu.com/8074-2/","reference_id":"USN-8074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-2/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"}],"fixed_packages":[],"aliases":["CVE-2025-37914"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kje2-4fqw-57gh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69178?format=json","vulnerability_id":"VCID-ptv6-28rx-nfg1","summary":"kernel: ALSA: bcd2000: Fix a UAF bug on the error path of probing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50229.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50229.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50229","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06113","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06151","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06142","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06138","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06131","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06089","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06044","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18902","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18864","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18901","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19005","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18984","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18996","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19004","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18896","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18879","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18837","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18714","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18798","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50229"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373460","reference_id":"2373460","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17109","reference_id":"RHSA-2025:17109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17161","reference_id":"RHSA-2025:17161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18043","reference_id":"RHSA-2025:18043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21667","reference_id":"RHSA-2025:21667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"}],"fixed_packages":[],"aliases":["CVE-2022-50229"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ptv6-28rx-nfg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69352?format=json","vulnerability_id":"VCID-uzjj-fu59-1uhh","summary":"kernel: drm/amd/display: clear optc underflow before turn off odm clock","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49969.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49969.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49969","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06508","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06505","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06498","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06488","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06428","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19846","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19808","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19836","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19923","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19925","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19921","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19806","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19776","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19685","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19761","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49969"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373635","reference_id":"2373635","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17159","reference_id":"RHSA-2025:17159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17192","reference_id":"RHSA-2025:17192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18043","reference_id":"RHSA-2025:18043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21667","reference_id":"RHSA-2025:21667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"}],"fixed_packages":[],"aliases":["CVE-2022-49969"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uzjj-fu59-1uhh"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.164.1%3Farch=el8_6"}