{"url":"http://public2.vulnerablecode.io/api/packages/90020?format=json","purl":"pkg:rpm/redhat/kernel@5.14.0-70.138.1?arch=el9_0","type":"rpm","namespace":"redhat","name":"kernel","version":"5.14.0-70.138.1","qualifiers":{"arch":"el9_0"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70984?format=json","vulnerability_id":"VCID-24gw-73zd-3khc","summary":"kernel: ipv6: mcast: extend RCU protection in igmp6_send()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21759.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21759.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21759","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34604","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34561","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34633","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34635","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34596","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34572","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34611","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34597","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00561","scoring_system":"epss","scoring_elements":"0.68356","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00561","scoring_system":"epss","scoring_elements":"0.68399","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00561","scoring_system":"epss","scoring_elements":"0.68374","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00561","scoring_system":"epss","scoring_elements":"0.68379","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00561","scoring_system":"epss","scoring_elements":"0.68324","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00561","scoring_system":"epss","scoring_elements":"0.68367","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21759"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21759"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/087c1faa594fa07a66933d750c0b2610aa1a2946","reference_id":"087c1faa594fa07a66933d750c0b2610aa1a2946","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:57:46Z/"}],"url":"https://git.kernel.org/stable/c/087c1faa594fa07a66933d750c0b2610aa1a2946"},{"reference_url":"https://git.kernel.org/stable/c/0bf8e2f3768629d437a32cb824149e6e98254381","reference_id":"0bf8e2f3768629d437a32cb824149e6e98254381","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:57:46Z/"}],"url":"https://git.kernel.org/stable/c/0bf8e2f3768629d437a32cb824149e6e98254381"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348596","reference_id":"2348596","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348596"},{"reference_url":"https://git.kernel.org/stable/c/81b25a07ebf53f9ef4ca8f3d96a8ddb94561dd5a","reference_id":"81b25a07ebf53f9ef4ca8f3d96a8ddb94561dd5a","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:57:46Z/"}],"url":"https://git.kernel.org/stable/c/81b25a07ebf53f9ef4ca8f3d96a8ddb94561dd5a"},{"reference_url":"https://git.kernel.org/stable/c/8e92d6a413feaf968a33f0b439ecf27404407458","reference_id":"8e92d6a413feaf968a33f0b439ecf27404407458","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:57:46Z/"}],"url":"https://git.kernel.org/stable/c/8e92d6a413feaf968a33f0b439ecf27404407458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10371","reference_id":"RHSA-2025:10371","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10371"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10379","reference_id":"RHSA-2025:10379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10829","reference_id":"RHSA-2025:10829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10830","reference_id":"RHSA-2025:10830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11245","reference_id":"RHSA-2025:11245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12209","reference_id":"RHSA-2025:12209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12311","reference_id":"RHSA-2025:12311","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12311"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13589","reference_id":"RHSA-2025:13589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13590","reference_id":"RHSA-2025:13590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14985","reference_id":"RHSA-2025:14985","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14985"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15656","reference_id":"RHSA-2025:15656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15660","reference_id":"RHSA-2025:15660","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15660"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17124","reference_id":"RHSA-2025:17124","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17124"},{"reference_url":"https://usn.ubuntu.com/7521-1/","reference_id":"USN-7521-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7521-1/"},{"reference_url":"https://usn.ubuntu.com/7521-2/","reference_id":"USN-7521-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7521-2/"},{"reference_url":"https://usn.ubuntu.com/7521-3/","reference_id":"USN-7521-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7521-3/"},{"reference_url":"https://usn.ubuntu.com/7703-1/","reference_id":"USN-7703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7703-1/"},{"reference_url":"https://usn.ubuntu.com/7703-2/","reference_id":"USN-7703-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7703-2/"},{"reference_url":"https://usn.ubuntu.com/7703-3/","reference_id":"USN-7703-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7703-3/"},{"reference_url":"https://usn.ubuntu.com/7703-4/","reference_id":"USN-7703-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7703-4/"},{"reference_url":"https://usn.ubuntu.com/7719-1/","reference_id":"USN-7719-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7719-1/"},{"reference_url":"https://usn.ubuntu.com/7737-1/","reference_id":"USN-7737-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7737-1/"}],"fixed_packages":[],"aliases":["CVE-2025-21759"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-24gw-73zd-3khc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69940?format=json","vulnerability_id":"VCID-2czc-s79t-13fw","summary":"kernel: ext4: ignore xattrs past end","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-37738.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-37738.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-37738","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15635","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15702","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15503","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15645","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15575","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1551","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15435","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15441","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15494","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15535","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15533","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15477","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15467","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-37738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37738"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363305","reference_id":"2363305","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10671","reference_id":"RHSA-2025:10671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10675","reference_id":"RHSA-2025:10675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10829","reference_id":"RHSA-2025:10829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10830","reference_id":"RHSA-2025:10830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11245","reference_id":"RHSA-2025:11245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11298","reference_id":"RHSA-2025:11298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11299","reference_id":"RHSA-2025:11299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12238","reference_id":"RHSA-2025:12238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12623","reference_id":"RHSA-2025:12623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13061","reference_id":"RHSA-2025:13061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13061"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13099","reference_id":"RHSA-2025:13099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9302","reference_id":"RHSA-2025:9302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9348","reference_id":"RHSA-2025:9348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9348"},{"reference_url":"https://usn.ubuntu.com/7594-1/","reference_id":"USN-7594-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-1/"},{"reference_url":"https://usn.ubuntu.com/7594-2/","reference_id":"USN-7594-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-2/"},{"reference_url":"https://usn.ubuntu.com/7594-3/","reference_id":"USN-7594-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-3/"},{"reference_url":"https://usn.ubuntu.com/7654-1/","reference_id":"USN-7654-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-1/"},{"reference_url":"https://usn.ubuntu.com/7654-2/","reference_id":"USN-7654-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-2/"},{"reference_url":"https://usn.ubuntu.com/7654-3/","reference_id":"USN-7654-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-3/"},{"reference_url":"https://usn.ubuntu.com/7654-4/","reference_id":"USN-7654-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-4/"},{"reference_url":"https://usn.ubuntu.com/7654-5/","reference_id":"USN-7654-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7654-5/"},{"reference_url":"https://usn.ubuntu.com/7655-1/","reference_id":"USN-7655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7655-1/"},{"reference_url":"https://usn.ubuntu.com/7686-1/","reference_id":"USN-7686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7686-1/"},{"reference_url":"https://usn.ubuntu.com/7711-1/","reference_id":"USN-7711-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7711-1/"},{"reference_url":"https://usn.ubuntu.com/7712-1/","reference_id":"USN-7712-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7712-1/"},{"reference_url":"https://usn.ubuntu.com/7712-2/","reference_id":"USN-7712-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7712-2/"},{"reference_url":"https://usn.ubuntu.com/8028-1/","reference_id":"USN-8028-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-1/"},{"reference_url":"https://usn.ubuntu.com/8028-2/","reference_id":"USN-8028-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-2/"},{"reference_url":"https://usn.ubuntu.com/8028-3/","reference_id":"USN-8028-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-3/"},{"reference_url":"https://usn.ubuntu.com/8028-4/","reference_id":"USN-8028-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-4/"},{"reference_url":"https://usn.ubuntu.com/8028-5/","reference_id":"USN-8028-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-5/"},{"reference_url":"https://usn.ubuntu.com/8028-6/","reference_id":"USN-8028-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-6/"},{"reference_url":"https://usn.ubuntu.com/8028-7/","reference_id":"USN-8028-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-7/"},{"reference_url":"https://usn.ubuntu.com/8028-8/","reference_id":"USN-8028-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-8/"},{"reference_url":"https://usn.ubuntu.com/8031-1/","reference_id":"USN-8031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-1/"},{"reference_url":"https://usn.ubuntu.com/8031-2/","reference_id":"USN-8031-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-2/"},{"reference_url":"https://usn.ubuntu.com/8031-3/","reference_id":"USN-8031-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-3/"},{"reference_url":"https://usn.ubuntu.com/8052-1/","reference_id":"USN-8052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-1/"},{"reference_url":"https://usn.ubuntu.com/8052-2/","reference_id":"USN-8052-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-2/"},{"reference_url":"https://usn.ubuntu.com/8074-1/","reference_id":"USN-8074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-1/"},{"reference_url":"https://usn.ubuntu.com/8074-2/","reference_id":"USN-8074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-2/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"}],"fixed_packages":[],"aliases":["CVE-2025-37738"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2czc-s79t-13fw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69400?format=json","vulnerability_id":"VCID-4mhb-xwq8-xyh8","summary":"kernel: net: atlantic: fix aq_vec index out of range error","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50066.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50066.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50066","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06814","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06864","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06949","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06948","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06937","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20493","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20675","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20563","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20529","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20422","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50066"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373683","reference_id":"2373683","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10671","reference_id":"RHSA-2025:10671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10673","reference_id":"RHSA-2025:10673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10673"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10675","reference_id":"RHSA-2025:10675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10761","reference_id":"RHSA-2025:10761","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10761"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10828","reference_id":"RHSA-2025:10828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10829","reference_id":"RHSA-2025:10829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10830","reference_id":"RHSA-2025:10830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10834","reference_id":"RHSA-2025:10834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11358","reference_id":"RHSA-2025:11358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11358"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11375","reference_id":"RHSA-2025:11375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11375"}],"fixed_packages":[],"aliases":["CVE-2022-50066"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4mhb-xwq8-xyh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71580?format=json","vulnerability_id":"VCID-6pvh-2n4u-7yaw","summary":"kernel: dm ioctl: prevent potential spectre v1 gadget","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49122.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49122.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49122","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01462","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0147","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01666","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01571","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0166","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01669","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01689","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01568","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02167","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02168","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02189","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02166","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16755","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16814","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49122"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348154","reference_id":"2348154","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348154"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7683","reference_id":"RHSA-2022:7683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10005","reference_id":"RHSA-2025:10005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10009","reference_id":"RHSA-2025:10009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10179","reference_id":"RHSA-2025:10179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10829","reference_id":"RHSA-2025:10829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10830","reference_id":"RHSA-2025:10830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10830"}],"fixed_packages":[],"aliases":["CVE-2022-49122"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6pvh-2n4u-7yaw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70484?format=json","vulnerability_id":"VCID-ex22-2qp4-fke8","summary":"kernel: net: atm: fix use after free in lec_send()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22004.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22004.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-22004","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15037","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15196","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15094","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14995","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15005","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15056","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15095","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15041","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14914","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15087","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15175","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-22004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22004"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357142","reference_id":"2357142","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357142"},{"reference_url":"https://git.kernel.org/stable/c/326223182e4703cde99fdbd36d07d0b3de9980fb","reference_id":"326223182e4703cde99fdbd36d07d0b3de9980fb","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-03T15:25:36Z/"}],"url":"https://git.kernel.org/stable/c/326223182e4703cde99fdbd36d07d0b3de9980fb"},{"reference_url":"https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30c","reference_id":"51e8be9578a2e74f9983d8fd8de8cafed191f30c","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-03T15:25:36Z/"}],"url":"https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30c"},{"reference_url":"https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730","reference_id":"9566f6ee13b17a15d0a47667ad1b1893c539f730","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-03T15:25:36Z/"}],"url":"https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730"},{"reference_url":"https://git.kernel.org/stable/c/f3009d0d6ab78053117f8857b921a8237f4d17b3","reference_id":"f3009d0d6ab78053117f8857b921a8237f4d17b3","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-03T15:25:36Z/"}],"url":"https://git.kernel.org/stable/c/f3009d0d6ab78053117f8857b921a8237f4d17b3"},{"reference_url":"https://git.kernel.org/stable/c/f3271f7548385e0096739965961c7cbf7e6b4762","reference_id":"f3271f7548385e0096739965961c7cbf7e6b4762","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-03T15:25:36Z/"}],"url":"https://git.kernel.org/stable/c/f3271f7548385e0096739965961c7cbf7e6b4762"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10379","reference_id":"RHSA-2025:10379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10829","reference_id":"RHSA-2025:10829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10830","reference_id":"RHSA-2025:10830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11245","reference_id":"RHSA-2025:11245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11298","reference_id":"RHSA-2025:11298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11299","reference_id":"RHSA-2025:11299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11358","reference_id":"RHSA-2025:11358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11358"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11375","reference_id":"RHSA-2025:11375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11570","reference_id":"RHSA-2025:11570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11571","reference_id":"RHSA-2025:11571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11572","reference_id":"RHSA-2025:11572","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11572"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12238","reference_id":"RHSA-2025:12238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12623","reference_id":"RHSA-2025:12623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13061","reference_id":"RHSA-2025:13061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13061"},{"reference_url":"https://usn.ubuntu.com/7585-1/","reference_id":"USN-7585-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-1/"},{"reference_url":"https://usn.ubuntu.com/7585-2/","reference_id":"USN-7585-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-2/"},{"reference_url":"https://usn.ubuntu.com/7585-3/","reference_id":"USN-7585-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-3/"},{"reference_url":"https://usn.ubuntu.com/7585-4/","reference_id":"USN-7585-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-4/"},{"reference_url":"https://usn.ubuntu.com/7585-5/","reference_id":"USN-7585-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-5/"},{"reference_url":"https://usn.ubuntu.com/7585-6/","reference_id":"USN-7585-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-6/"},{"reference_url":"https://usn.ubuntu.com/7585-7/","reference_id":"USN-7585-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-7/"},{"reference_url":"https://usn.ubuntu.com/7591-1/","reference_id":"USN-7591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-1/"},{"reference_url":"https://usn.ubuntu.com/7591-2/","reference_id":"USN-7591-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-2/"},{"reference_url":"https://usn.ubuntu.com/7591-3/","reference_id":"USN-7591-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-3/"},{"reference_url":"https://usn.ubuntu.com/7591-4/","reference_id":"USN-7591-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-4/"},{"reference_url":"https://usn.ubuntu.com/7591-5/","reference_id":"USN-7591-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-5/"},{"reference_url":"https://usn.ubuntu.com/7591-6/","reference_id":"USN-7591-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-6/"},{"reference_url":"https://usn.ubuntu.com/7592-1/","reference_id":"USN-7592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7592-1/"},{"reference_url":"https://usn.ubuntu.com/7593-1/","reference_id":"USN-7593-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7593-1/"},{"reference_url":"https://usn.ubuntu.com/7597-1/","reference_id":"USN-7597-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7597-1/"},{"reference_url":"https://usn.ubuntu.com/7597-2/","reference_id":"USN-7597-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7597-2/"},{"reference_url":"https://usn.ubuntu.com/7598-1/","reference_id":"USN-7598-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7598-1/"},{"reference_url":"https://usn.ubuntu.com/7602-1/","reference_id":"USN-7602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7602-1/"},{"reference_url":"https://usn.ubuntu.com/7605-1/","reference_id":"USN-7605-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7605-1/"},{"reference_url":"https://usn.ubuntu.com/7605-2/","reference_id":"USN-7605-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7605-2/"},{"reference_url":"https://usn.ubuntu.com/7606-1/","reference_id":"USN-7606-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7606-1/"},{"reference_url":"https://usn.ubuntu.com/7628-1/","reference_id":"USN-7628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7628-1/"},{"reference_url":"https://usn.ubuntu.com/7640-1/","reference_id":"USN-7640-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7640-1/"},{"reference_url":"https://usn.ubuntu.com/7655-1/","reference_id":"USN-7655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7655-1/"},{"reference_url":"https://usn.ubuntu.com/7764-1/","reference_id":"USN-7764-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7764-1/"},{"reference_url":"https://usn.ubuntu.com/7764-2/","reference_id":"USN-7764-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7764-2/"},{"reference_url":"https://usn.ubuntu.com/7765-1/","reference_id":"USN-7765-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7765-1/"},{"reference_url":"https://usn.ubuntu.com/7766-1/","reference_id":"USN-7766-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7766-1/"},{"reference_url":"https://usn.ubuntu.com/7767-1/","reference_id":"USN-7767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7767-1/"},{"reference_url":"https://usn.ubuntu.com/7767-2/","reference_id":"USN-7767-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7767-2/"},{"reference_url":"https://usn.ubuntu.com/7779-1/","reference_id":"USN-7779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7779-1/"},{"reference_url":"https://usn.ubuntu.com/7790-1/","reference_id":"USN-7790-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7790-1/"},{"reference_url":"https://usn.ubuntu.com/7800-1/","reference_id":"USN-7800-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7800-1/"},{"reference_url":"https://usn.ubuntu.com/7801-1/","reference_id":"USN-7801-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7801-1/"},{"reference_url":"https://usn.ubuntu.com/7801-2/","reference_id":"USN-7801-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7801-2/"},{"reference_url":"https://usn.ubuntu.com/7801-3/","reference_id":"USN-7801-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7801-3/"},{"reference_url":"https://usn.ubuntu.com/7802-1/","reference_id":"USN-7802-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7802-1/"},{"reference_url":"https://usn.ubuntu.com/7809-1/","reference_id":"USN-7809-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7809-1/"}],"fixed_packages":[],"aliases":["CVE-2025-22004"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ex22-2qp4-fke8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70063?format=json","vulnerability_id":"VCID-gphx-7wuy-q7cj","summary":"kernel: udf: Fix a slab-out-of-bounds write bug in udf_find_entry()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49846.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49846.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49846","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14298","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14094","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14361","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14169","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14305","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14212","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14047","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14045","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14122","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14158","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14133","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14064","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13937","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49846"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/03f9582a6a2ebd25a440896475c968428c4b63e7","reference_id":"03f9582a6a2ebd25a440896475c968428c4b63e7","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/"}],"url":"https://git.kernel.org/stable/c/03f9582a6a2ebd25a440896475c968428c4b63e7"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363432","reference_id":"2363432","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363432"},{"reference_url":"https://git.kernel.org/stable/c/583fdd98d94acba1e7225e5cc29063aef0741030","reference_id":"583fdd98d94acba1e7225e5cc29063aef0741030","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/"}],"url":"https://git.kernel.org/stable/c/583fdd98d94acba1e7225e5cc29063aef0741030"},{"reference_url":"https://git.kernel.org/stable/c/7a6051d734f1ed0031e2216f9a538621235c11a4","reference_id":"7a6051d734f1ed0031e2216f9a538621235c11a4","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/"}],"url":"https://git.kernel.org/stable/c/7a6051d734f1ed0031e2216f9a538621235c11a4"},{"reference_url":"https://git.kernel.org/stable/c/ac79001b8e603226fab17240a79cb9ef679d3cd9","reference_id":"ac79001b8e603226fab17240a79cb9ef679d3cd9","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/"}],"url":"https://git.kernel.org/stable/c/ac79001b8e603226fab17240a79cb9ef679d3cd9"},{"reference_url":"https://git.kernel.org/stable/c/c736ed8541605e3a25075bb1cbf8f38cb3083238","reference_id":"c736ed8541605e3a25075bb1cbf8f38cb3083238","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/"}],"url":"https://git.kernel.org/stable/c/c736ed8541605e3a25075bb1cbf8f38cb3083238"},{"reference_url":"https://git.kernel.org/stable/c/c8af247de385ce49afabc3bf1cf4fd455c94bfe8","reference_id":"c8af247de385ce49afabc3bf1cf4fd455c94bfe8","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/"}],"url":"https://git.kernel.org/stable/c/c8af247de385ce49afabc3bf1cf4fd455c94bfe8"},{"reference_url":"https://git.kernel.org/stable/c/d8971f410739a864c537e0ac29344a7b6c450232","reference_id":"d8971f410739a864c537e0ac29344a7b6c450232","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/"}],"url":"https://git.kernel.org/stable/c/d8971f410739a864c537e0ac29344a7b6c450232"},{"reference_url":"https://git.kernel.org/stable/c/f1517721c408631f09d54c743aa70cb07fd3eebd","reference_id":"f1517721c408631f09d54c743aa70cb07fd3eebd","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/"}],"url":"https://git.kernel.org/stable/c/f1517721c408631f09d54c743aa70cb07fd3eebd"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10379","reference_id":"RHSA-2025:10379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10669","reference_id":"RHSA-2025:10669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10670","reference_id":"RHSA-2025:10670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10671","reference_id":"RHSA-2025:10671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10673","reference_id":"RHSA-2025:10673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10673"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10675","reference_id":"RHSA-2025:10675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10701","reference_id":"RHSA-2025:10701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10761","reference_id":"RHSA-2025:10761","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10761"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10828","reference_id":"RHSA-2025:10828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10829","reference_id":"RHSA-2025:10829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10830","reference_id":"RHSA-2025:10830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10834","reference_id":"RHSA-2025:10834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10974","reference_id":"RHSA-2025:10974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10976","reference_id":"RHSA-2025:10976","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10977","reference_id":"RHSA-2025:10977","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10978","reference_id":"RHSA-2025:10978","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10978"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10979","reference_id":"RHSA-2025:10979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10980","reference_id":"RHSA-2025:10980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10981","reference_id":"RHSA-2025:10981","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10981"}],"fixed_packages":[],"aliases":["CVE-2022-49846"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gphx-7wuy-q7cj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70686?format=json","vulnerability_id":"VCID-h9pb-uqws-xkfm","summary":"kernel: Squashfs: fix handling and sanity checking of xattr_ids count","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52933.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52933.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52933","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01353","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1237","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1568","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15479","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15566","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15621","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15584","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15547","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15483","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15409","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15464","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15505","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15447","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15612","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52933"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355476","reference_id":"2355476","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10527","reference_id":"RHSA-2025:10527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10829","reference_id":"RHSA-2025:10829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10830","reference_id":"RHSA-2025:10830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11045","reference_id":"RHSA-2025:11045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11245","reference_id":"RHSA-2025:11245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9880","reference_id":"RHSA-2025:9880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9880"}],"fixed_packages":[],"aliases":["CVE-2023-52933"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h9pb-uqws-xkfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70244?format=json","vulnerability_id":"VCID-jnth-yxuv-mbfs","summary":"kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22121.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22121.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-22121","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24931","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24971","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24744","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24811","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2487","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24831","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24787","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24778","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24755","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24695","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24683","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24639","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24515","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24593","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-22121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22121"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2360199","reference_id":"2360199","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2360199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10829","reference_id":"RHSA-2025:10829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10830","reference_id":"RHSA-2025:10830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11245","reference_id":"RHSA-2025:11245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11571","reference_id":"RHSA-2025:11571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11572","reference_id":"RHSA-2025:11572","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11572"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11855","reference_id":"RHSA-2025:11855","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11861","reference_id":"RHSA-2025:11861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11861"},{"reference_url":"https://usn.ubuntu.com/7594-1/","reference_id":"USN-7594-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-1/"},{"reference_url":"https://usn.ubuntu.com/7594-2/","reference_id":"USN-7594-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-2/"},{"reference_url":"https://usn.ubuntu.com/7594-3/","reference_id":"USN-7594-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-3/"},{"reference_url":"https://usn.ubuntu.com/8095-1/","reference_id":"USN-8095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-1/"},{"reference_url":"https://usn.ubuntu.com/8095-2/","reference_id":"USN-8095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-2/"},{"reference_url":"https://usn.ubuntu.com/8095-3/","reference_id":"USN-8095-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-3/"},{"reference_url":"https://usn.ubuntu.com/8095-4/","reference_id":"USN-8095-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-4/"},{"reference_url":"https://usn.ubuntu.com/8095-5/","reference_id":"USN-8095-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8095-5/"},{"reference_url":"https://usn.ubuntu.com/8096-1/","reference_id":"USN-8096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-1/"},{"reference_url":"https://usn.ubuntu.com/8096-2/","reference_id":"USN-8096-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-2/"},{"reference_url":"https://usn.ubuntu.com/8096-3/","reference_id":"USN-8096-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-3/"},{"reference_url":"https://usn.ubuntu.com/8096-4/","reference_id":"USN-8096-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-4/"},{"reference_url":"https://usn.ubuntu.com/8096-5/","reference_id":"USN-8096-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8096-5/"},{"reference_url":"https://usn.ubuntu.com/8100-1/","reference_id":"USN-8100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8100-1/"},{"reference_url":"https://usn.ubuntu.com/8116-1/","reference_id":"USN-8116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8116-1/"},{"reference_url":"https://usn.ubuntu.com/8125-1/","reference_id":"USN-8125-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8125-1/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://usn.ubuntu.com/8141-1/","reference_id":"USN-8141-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8141-1/"},{"reference_url":"https://usn.ubuntu.com/8163-1/","reference_id":"USN-8163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-1/"},{"reference_url":"https://usn.ubuntu.com/8163-2/","reference_id":"USN-8163-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8163-2/"},{"reference_url":"https://usn.ubuntu.com/8165-1/","reference_id":"USN-8165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8165-1/"},{"reference_url":"https://usn.ubuntu.com/8243-1/","reference_id":"USN-8243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8243-1/"},{"reference_url":"https://usn.ubuntu.com/8261-1/","reference_id":"USN-8261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8261-1/"}],"fixed_packages":[],"aliases":["CVE-2025-22121"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jnth-yxuv-mbfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71332?format=json","vulnerability_id":"VCID-tawg-cw1b-4fc6","summary":"kernel: um: Fix out-of-bounds read in LDT setup","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49395.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49395.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49395","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07696","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0774","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16838","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16817","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16774","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16715","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16651","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16658","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16697","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16589","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1642","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1654","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16698","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16784","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49395"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347899","reference_id":"2347899","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10179","reference_id":"RHSA-2025:10179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10211","reference_id":"RHSA-2025:10211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10527","reference_id":"RHSA-2025:10527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10828","reference_id":"RHSA-2025:10828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10829","reference_id":"RHSA-2025:10829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10830","reference_id":"RHSA-2025:10830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11045","reference_id":"RHSA-2025:11045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11570","reference_id":"RHSA-2025:11570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13135","reference_id":"RHSA-2025:13135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8743","reference_id":"RHSA-2025:8743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8744","reference_id":"RHSA-2025:8744","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8744"}],"fixed_packages":[],"aliases":["CVE-2022-49395"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tawg-cw1b-4fc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70310?format=json","vulnerability_id":"VCID-zs1j-hpbv-7qbz","summary":"kernel: ibmvnic: Use kernel helpers for hex dumps","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22104.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22104.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-22104","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23007","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22842","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22916","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22968","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22986","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22893","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22901","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22864","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22697","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22691","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22688","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22586","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2267","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-22104"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22104","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22104"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2360265","reference_id":"2360265","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2360265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10829","reference_id":"RHSA-2025:10829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10830","reference_id":"RHSA-2025:10830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11571","reference_id":"RHSA-2025:11571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11572","reference_id":"RHSA-2025:11572","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11572"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11810","reference_id":"RHSA-2025:11810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11810"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9302","reference_id":"RHSA-2025:9302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9896","reference_id":"RHSA-2025:9896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9896"},{"reference_url":"https://usn.ubuntu.com/7594-1/","reference_id":"USN-7594-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-1/"},{"reference_url":"https://usn.ubuntu.com/7594-2/","reference_id":"USN-7594-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-2/"},{"reference_url":"https://usn.ubuntu.com/7594-3/","reference_id":"USN-7594-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7594-3/"}],"fixed_packages":[],"aliases":["CVE-2025-22104"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zs1j-hpbv-7qbz"}],"fixing_vulnerabilities":[],"risk_score":"3.3","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-70.138.1%3Farch=el9_0"}