Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/89612?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/89612?format=api", "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.144.1.rt21.216?arch=el9_0", "type": "rpm", "namespace": "redhat", "name": "kernel-rt", "version": "5.14.0-70.144.1.rt21.216", "qualifiers": { "arch": "el9_0" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68612?format=api", "vulnerability_id": "VCID-6hh8-5da7-2qcc", "summary": "kernel: net/sched: Always pass notifications when child class becomes empty", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38350.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38350.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-38350", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05952", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07666", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07726", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07744", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07743", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07729", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07713", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07697", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08693", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08582", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08569", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08724", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0869", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08784", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08642", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-38350" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38350", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38350" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2382054", "reference_id": "2382054", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2382054" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14413", "reference_id": "RHSA-2025:14413", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14413" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14511", "reference_id": "RHSA-2025:14511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14691", "reference_id": "RHSA-2025:14691", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14691" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14692", "reference_id": "RHSA-2025:14692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14692" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14696", "reference_id": "RHSA-2025:14696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14696" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14742", "reference_id": "RHSA-2025:14742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14744", "reference_id": "RHSA-2025:14744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14746", "reference_id": "RHSA-2025:14746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14746" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14748", "reference_id": "RHSA-2025:14748", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14748" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14749", "reference_id": "RHSA-2025:14749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15011", "reference_id": "RHSA-2025:15011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15016", "reference_id": "RHSA-2025:15016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15035", "reference_id": "RHSA-2025:15035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15447", "reference_id": "RHSA-2025:15447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15785", "reference_id": "RHSA-2025:15785", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15785" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15786", "reference_id": "RHSA-2025:15786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16538", "reference_id": "RHSA-2025:16538", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16538" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16539", "reference_id": "RHSA-2025:16539", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16539" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16540", "reference_id": "RHSA-2025:16540", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16540" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16541", "reference_id": "RHSA-2025:16541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16580", "reference_id": "RHSA-2025:16580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16582", "reference_id": "RHSA-2025:16582", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16582" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16583", "reference_id": "RHSA-2025:16583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16583" }, { "reference_url": "https://usn.ubuntu.com/7722-1/", "reference_id": "USN-7722-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7722-1/" }, { "reference_url": "https://usn.ubuntu.com/7722-2/", "reference_id": "USN-7722-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7722-2/" }, { "reference_url": "https://usn.ubuntu.com/7724-1/", "reference_id": "USN-7724-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7724-1/" }, { "reference_url": "https://usn.ubuntu.com/7725-1/", "reference_id": "USN-7725-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7725-1/" }, { "reference_url": "https://usn.ubuntu.com/7725-2/", "reference_id": "USN-7725-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7725-2/" }, { "reference_url": "https://usn.ubuntu.com/7725-3/", "reference_id": "USN-7725-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7725-3/" }, { "reference_url": "https://usn.ubuntu.com/7726-1/", "reference_id": "USN-7726-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7726-1/" }, { "reference_url": "https://usn.ubuntu.com/7726-2/", "reference_id": "USN-7726-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7726-2/" }, { "reference_url": "https://usn.ubuntu.com/7726-3/", "reference_id": "USN-7726-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7726-3/" }, { "reference_url": "https://usn.ubuntu.com/7726-4/", "reference_id": "USN-7726-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7726-4/" }, { "reference_url": "https://usn.ubuntu.com/7726-5/", "reference_id": "USN-7726-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7726-5/" }, { "reference_url": "https://usn.ubuntu.com/7754-1/", "reference_id": "USN-7754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7754-1/" }, { "reference_url": "https://usn.ubuntu.com/7754-2/", "reference_id": "USN-7754-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7754-2/" }, { "reference_url": "https://usn.ubuntu.com/7755-1/", "reference_id": "USN-7755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7755-1/" }, { "reference_url": "https://usn.ubuntu.com/7755-2/", "reference_id": "USN-7755-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7755-2/" }, { "reference_url": "https://usn.ubuntu.com/7755-3/", "reference_id": "USN-7755-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7755-3/" }, { "reference_url": "https://usn.ubuntu.com/7770-1/", "reference_id": "USN-7770-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7770-1/" }, { "reference_url": "https://usn.ubuntu.com/7776-1/", "reference_id": "USN-7776-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7776-1/" }, { "reference_url": "https://usn.ubuntu.com/7779-1/", "reference_id": "USN-7779-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7779-1/" }, { "reference_url": "https://usn.ubuntu.com/7802-1/", "reference_id": "USN-7802-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7802-1/" }, { "reference_url": "https://usn.ubuntu.com/7809-1/", "reference_id": "USN-7809-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7809-1/" }, { "reference_url": "https://usn.ubuntu.com/7819-1/", "reference_id": "USN-7819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7819-1/" }, { "reference_url": "https://usn.ubuntu.com/7819-2/", "reference_id": "USN-7819-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7819-2/" }, { "reference_url": "https://usn.ubuntu.com/7820-1/", "reference_id": "USN-7820-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7820-1/" }, { "reference_url": "https://usn.ubuntu.com/7832-1/", "reference_id": "USN-7832-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7832-1/" }, { "reference_url": "https://usn.ubuntu.com/7875-1/", "reference_id": "USN-7875-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7875-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-38350" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6hh8-5da7-2qcc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69356?format=api", "vulnerability_id": "VCID-7yx5-6a41-8bfe", "summary": "kernel: mm/hugetlb: avoid corrupting page->mapping in hugetlb_mcopy_atomic_pte", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49991.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49991.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49991", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04734", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04751", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04784", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04796", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04788", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04768", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15099", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15058", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15068", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15119", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15157", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15161", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15104", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14974", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49991" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373639", "reference_id": "2373639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373639" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14744", "reference_id": "RHSA-2025:14744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14749", "reference_id": "RHSA-2025:14749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14749" } ], "fixed_packages": [], "aliases": [ "CVE-2022-49991" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7yx5-6a41-8bfe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69290?format=api", "vulnerability_id": "VCID-8h5v-srys-4fdr", "summary": "kernel: ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49977.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49977.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49977", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04953", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04988", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.0501", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05042", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05058", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05038", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.0502", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05002", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1561", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15574", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15584", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15634", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1568", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15677", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15618", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15489", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49977" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49977", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49977" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373574", "reference_id": "2373574", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373574" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11850", "reference_id": "RHSA-2025:11850", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11851", "reference_id": "RHSA-2025:11851", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11851" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14511", "reference_id": "RHSA-2025:14511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14691", "reference_id": "RHSA-2025:14691", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14691" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14692", "reference_id": "RHSA-2025:14692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14692" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14696", "reference_id": "RHSA-2025:14696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14696" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14742", "reference_id": "RHSA-2025:14742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14744", "reference_id": "RHSA-2025:14744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14749", "reference_id": "RHSA-2025:14749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15035", "reference_id": "RHSA-2025:15035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15035" } ], "fixed_packages": [], "aliases": [ "CVE-2022-49977" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8h5v-srys-4fdr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69344?format=api", "vulnerability_id": "VCID-bja8-gn8x-1yam", "summary": "kernel: net: qrtr: start MHI channel after endpoit creation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50044.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50044.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50044", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02662", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02691", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02699", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02701", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02722", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02695", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0268", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02677", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11296", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11269", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1127", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11397", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11339", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11295", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11231", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11164", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50044" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373627", "reference_id": "2373627", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14744", "reference_id": "RHSA-2025:14744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14749", "reference_id": "RHSA-2025:14749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14749" } ], "fixed_packages": [], "aliases": [ "CVE-2022-50044" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bja8-gn8x-1yam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71449?format=api", "vulnerability_id": "VCID-errx-apnp-zuhe", "summary": "kernel: driver: base: fix UAF when driver_attach failed", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49385.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49385.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49385", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10638", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10701", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23894", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24096", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24162", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24207", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24224", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24182", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24125", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2414", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24127", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24103", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23978", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23965", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23925", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23812", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49385" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49385", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49385" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348020", "reference_id": "2348020", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348020" }, { "reference_url": "https://git.kernel.org/stable/c/310862e574001a97ad02272bac0fd13f75f42a27", "reference_id": "310862e574001a97ad02272bac0fd13f75f42a27", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:41Z/" } ], "url": "https://git.kernel.org/stable/c/310862e574001a97ad02272bac0fd13f75f42a27" }, { "reference_url": "https://git.kernel.org/stable/c/5389101257828d1913d713d9a40acbe14f5961df", "reference_id": "5389101257828d1913d713d9a40acbe14f5961df", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:41Z/" } ], "url": "https://git.kernel.org/stable/c/5389101257828d1913d713d9a40acbe14f5961df" }, { "reference_url": "https://git.kernel.org/stable/c/5d709f58c743166fe1c6914b9de0ae8868600d9b", "reference_id": "5d709f58c743166fe1c6914b9de0ae8868600d9b", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:41Z/" } ], "url": "https://git.kernel.org/stable/c/5d709f58c743166fe1c6914b9de0ae8868600d9b" }, { "reference_url": "https://git.kernel.org/stable/c/823f24f2e329babd0330200d0b74882516fe57f4", "reference_id": "823f24f2e329babd0330200d0b74882516fe57f4", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:41Z/" } ], "url": "https://git.kernel.org/stable/c/823f24f2e329babd0330200d0b74882516fe57f4" }, { "reference_url": "https://git.kernel.org/stable/c/c059665c84feab46b7173d3a1bf36c2fb7f9df86", "reference_id": "c059665c84feab46b7173d3a1bf36c2fb7f9df86", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:41Z/" } ], "url": "https://git.kernel.org/stable/c/c059665c84feab46b7173d3a1bf36c2fb7f9df86" }, { "reference_url": "https://git.kernel.org/stable/c/cdf1a683a01583bca4b618dd16223cbd6e462e21", "reference_id": "cdf1a683a01583bca4b618dd16223cbd6e462e21", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:41Z/" } ], "url": "https://git.kernel.org/stable/c/cdf1a683a01583bca4b618dd16223cbd6e462e21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14744", "reference_id": "RHSA-2025:14744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14749", "reference_id": "RHSA-2025:14749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14749" } ], "fixed_packages": [], "aliases": [ "CVE-2022-49385" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-errx-apnp-zuhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70269?format=api", "vulnerability_id": "VCID-nmgk-3hpz-g7ec", "summary": "kernel: nfsd: don't ignore the return code of svc_proc_register()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22026.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22026.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-22026", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23684", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23726", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23506", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23623", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.2364", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23597", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23541", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23553", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23546", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23525", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23339", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23328", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23312", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23209", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23294", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-22026" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22026" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2360224", "reference_id": "2360224", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2360224" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13946", "reference_id": "RHSA-2025:13946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14003", "reference_id": "RHSA-2025:14003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14005", "reference_id": "RHSA-2025:14005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14744", "reference_id": "RHSA-2025:14744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14749", "reference_id": "RHSA-2025:14749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16919", "reference_id": "RHSA-2025:16919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16920", "reference_id": "RHSA-2025:16920", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16920" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17396", "reference_id": "RHSA-2025:17396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18281", "reference_id": "RHSA-2025:18281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18932", "reference_id": "RHSA-2025:18932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19222", "reference_id": "RHSA-2025:19222", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19222" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21063", "reference_id": "RHSA-2025:21063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21063" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21082", "reference_id": "RHSA-2025:21082", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21082" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21667", "reference_id": "RHSA-2025:21667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22752", "reference_id": "RHSA-2025:22752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22752" }, { "reference_url": "https://usn.ubuntu.com/7594-1/", "reference_id": "USN-7594-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7594-1/" }, { "reference_url": "https://usn.ubuntu.com/7594-2/", "reference_id": "USN-7594-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7594-2/" }, { "reference_url": "https://usn.ubuntu.com/7594-3/", "reference_id": "USN-7594-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7594-3/" }, { "reference_url": "https://usn.ubuntu.com/8028-1/", "reference_id": "USN-8028-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-1/" }, { "reference_url": "https://usn.ubuntu.com/8028-2/", "reference_id": "USN-8028-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-2/" }, { "reference_url": "https://usn.ubuntu.com/8028-3/", "reference_id": "USN-8028-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-3/" }, { "reference_url": "https://usn.ubuntu.com/8028-4/", "reference_id": "USN-8028-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-4/" }, { "reference_url": "https://usn.ubuntu.com/8028-5/", "reference_id": "USN-8028-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-5/" }, { "reference_url": "https://usn.ubuntu.com/8028-6/", "reference_id": "USN-8028-6", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-6/" }, { "reference_url": "https://usn.ubuntu.com/8028-7/", "reference_id": "USN-8028-7", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-7/" }, { "reference_url": "https://usn.ubuntu.com/8028-8/", "reference_id": "USN-8028-8", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-8/" }, { "reference_url": "https://usn.ubuntu.com/8031-1/", "reference_id": "USN-8031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-1/" }, { "reference_url": "https://usn.ubuntu.com/8031-2/", "reference_id": "USN-8031-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-2/" }, { "reference_url": "https://usn.ubuntu.com/8031-3/", "reference_id": "USN-8031-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-3/" }, { "reference_url": "https://usn.ubuntu.com/8052-1/", "reference_id": "USN-8052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-1/" }, { "reference_url": "https://usn.ubuntu.com/8052-2/", "reference_id": "USN-8052-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-2/" }, { "reference_url": "https://usn.ubuntu.com/8074-1/", "reference_id": "USN-8074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-1/" }, { "reference_url": "https://usn.ubuntu.com/8074-2/", "reference_id": "USN-8074-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-2/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-22026" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nmgk-3hpz-g7ec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69650?format=api", "vulnerability_id": "VCID-p4s5-y8ck-ufad", "summary": "kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-37890.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-37890.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-37890", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24195", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24231", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24018", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24085", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24131", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24148", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24106", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24049", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24062", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24051", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24034", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23907", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23894", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23852", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23736", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23819", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-37890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37890" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366848", "reference_id": "2366848", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366848" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12209", "reference_id": "RHSA-2025:12209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12662", "reference_id": "RHSA-2025:12662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12746", "reference_id": "RHSA-2025:12746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12746" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12752", "reference_id": "RHSA-2025:12752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12753", "reference_id": "RHSA-2025:12753", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12753" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13135", "reference_id": "RHSA-2025:13135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14511", "reference_id": "RHSA-2025:14511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14692", "reference_id": "RHSA-2025:14692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14692" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14742", "reference_id": "RHSA-2025:14742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14744", "reference_id": "RHSA-2025:14744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14749", "reference_id": "RHSA-2025:14749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15035", "reference_id": "RHSA-2025:15035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16538", "reference_id": "RHSA-2025:16538", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16538" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16539", "reference_id": "RHSA-2025:16539", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16539" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16540", "reference_id": "RHSA-2025:16540", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16540" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16541", "reference_id": "RHSA-2025:16541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16580", "reference_id": "RHSA-2025:16580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16582", "reference_id": "RHSA-2025:16582", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16582" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16583", "reference_id": "RHSA-2025:16583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16583" }, { "reference_url": "https://usn.ubuntu.com/7608-1/", "reference_id": "USN-7608-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7608-1/" }, { "reference_url": "https://usn.ubuntu.com/7608-2/", "reference_id": "USN-7608-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7608-2/" }, { "reference_url": "https://usn.ubuntu.com/7608-3/", "reference_id": "USN-7608-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7608-3/" }, { "reference_url": "https://usn.ubuntu.com/7608-4/", "reference_id": "USN-7608-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7608-4/" }, { "reference_url": "https://usn.ubuntu.com/7608-5/", "reference_id": "USN-7608-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7608-5/" }, { "reference_url": "https://usn.ubuntu.com/7608-6/", "reference_id": "USN-7608-6", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7608-6/" }, { "reference_url": "https://usn.ubuntu.com/7608-7/", "reference_id": "USN-7608-7", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7608-7/" }, { "reference_url": "https://usn.ubuntu.com/7609-1/", "reference_id": "USN-7609-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7609-1/" }, { "reference_url": "https://usn.ubuntu.com/7609-2/", "reference_id": "USN-7609-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7609-2/" }, { "reference_url": "https://usn.ubuntu.com/7609-3/", "reference_id": "USN-7609-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7609-3/" }, { "reference_url": "https://usn.ubuntu.com/7609-4/", "reference_id": "USN-7609-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7609-4/" }, { "reference_url": "https://usn.ubuntu.com/7609-5/", "reference_id": "USN-7609-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7609-5/" }, { "reference_url": "https://usn.ubuntu.com/7610-1/", "reference_id": "USN-7610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7610-1/" }, { "reference_url": "https://usn.ubuntu.com/7610-2/", "reference_id": "USN-7610-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7610-2/" }, { "reference_url": "https://usn.ubuntu.com/7610-3/", "reference_id": "USN-7610-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7610-3/" }, { "reference_url": "https://usn.ubuntu.com/7611-1/", "reference_id": "USN-7611-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7611-1/" }, { "reference_url": "https://usn.ubuntu.com/7611-2/", "reference_id": "USN-7611-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7611-2/" }, { "reference_url": "https://usn.ubuntu.com/7611-3/", "reference_id": "USN-7611-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7611-3/" }, { "reference_url": "https://usn.ubuntu.com/7611-4/", "reference_id": "USN-7611-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7611-4/" }, { "reference_url": "https://usn.ubuntu.com/7618-1/", "reference_id": "USN-7618-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7618-1/" }, { "reference_url": "https://usn.ubuntu.com/7628-1/", "reference_id": "USN-7628-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7628-1/" }, { "reference_url": "https://usn.ubuntu.com/7653-1/", "reference_id": "USN-7653-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7653-1/" }, { "reference_url": "https://usn.ubuntu.com/7655-1/", "reference_id": "USN-7655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7655-1/" }, { "reference_url": "https://usn.ubuntu.com/7665-2/", "reference_id": "USN-7665-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7665-2/" }, { "reference_url": "https://usn.ubuntu.com/7671-1/", "reference_id": "USN-7671-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7671-1/" }, { "reference_url": "https://usn.ubuntu.com/7671-2/", "reference_id": "USN-7671-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7671-2/" }, { "reference_url": "https://usn.ubuntu.com/7671-3/", "reference_id": "USN-7671-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7671-3/" }, { "reference_url": "https://usn.ubuntu.com/7686-1/", "reference_id": "USN-7686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7686-1/" }, { "reference_url": "https://usn.ubuntu.com/7712-1/", "reference_id": "USN-7712-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7712-1/" }, { "reference_url": "https://usn.ubuntu.com/7712-2/", "reference_id": "USN-7712-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7712-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-37890" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p4s5-y8ck-ufad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69799?format=api", "vulnerability_id": "VCID-s7n6-yg5w-vuem", "summary": "kernel: tee: amdtee: fix race condition in amdtee_open_session", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53047.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53047.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53047", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15108", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15176", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1498", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15068", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1512", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15087", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15049", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14988", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14886", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14893", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14948", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14986", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14989", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14931", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14805", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14932", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53047" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363689", "reference_id": "2363689", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363689" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14003", "reference_id": "RHSA-2025:14003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14005", "reference_id": "RHSA-2025:14005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14744", "reference_id": "RHSA-2025:14744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14749", "reference_id": "RHSA-2025:14749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14749" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53047" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s7n6-yg5w-vuem" } ], "fixing_vulnerabilities": [], "risk_score": "3.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-70.144.1.rt21.216%3Farch=el9_0" }