Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/92778?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/92778?format=api", "purl": "pkg:rpm/redhat/kernel@5.14.0-284.85.1?arch=el9_2", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "5.14.0-284.85.1", "qualifiers": { "arch": "el9_2" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74506?format=api", "vulnerability_id": "VCID-8ud8-f75a-jyew", "summary": "kernel: ice: Fix improper extts handling", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-42139.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-42139.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-42139", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01041", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01043", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01037", "published_at": "2026-04-24T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00931", "published_at": "2026-04-11T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00927", "published_at": "2026-04-12T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00928", "published_at": "2026-04-13T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00925", "published_at": "2026-04-16T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00932", "published_at": "2026-04-18T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.0098", "published_at": "2026-05-09T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00939", "published_at": "2026-04-04T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00943", "published_at": "2026-04-09T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00947", "published_at": "2026-04-08T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00982", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-42139" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/00d3b4f54582d4e4a02cda5886bb336eeab268cc", "reference_id": "00d3b4f54582d4e4a02cda5886bb336eeab268cc", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:15:59Z/" } ], "url": "https://git.kernel.org/stable/c/00d3b4f54582d4e4a02cda5886bb336eeab268cc" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301504", "reference_id": "2301504", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301504" }, { "reference_url": "https://git.kernel.org/stable/c/9f69b31ae9e25dec27ad31fbc64dd99af16ee3d3", "reference_id": "9f69b31ae9e25dec27ad31fbc64dd99af16ee3d3", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:15:59Z/" } ], "url": "https://git.kernel.org/stable/c/9f69b31ae9e25dec27ad31fbc64dd99af16ee3d3" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7004", "reference_id": "RHSA-2024:7004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7005", "reference_id": "RHSA-2024:7005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7005" } ], "fixed_packages": [], "aliases": [ "CVE-2024-42139" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ud8-f75a-jyew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75474?format=api", "vulnerability_id": "VCID-djgy-muty-mygk", "summary": "kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36899.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36899.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36899", "reference_id": "", "reference_type": "", "scores": [ { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00501", "published_at": "2026-04-02T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00496", "published_at": "2026-04-04T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00678", "published_at": "2026-05-09T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00635", "published_at": "2026-04-16T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.0064", "published_at": "2026-04-18T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00681", "published_at": "2026-04-21T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.0068", "published_at": "2026-04-24T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00682", "published_at": "2026-04-26T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00683", "published_at": "2026-05-07T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.0069", "published_at": "2026-05-05T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00655", "published_at": "2026-04-07T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00653", "published_at": "2026-04-08T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00647", "published_at": "2026-04-11T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00642", "published_at": "2026-04-12T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00644", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36899" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36899", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36899" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/02f6b0e1ec7e0e7d059dddc893645816552039da", "reference_id": "02f6b0e1ec7e0e7d059dddc893645816552039da", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-10T18:48:31Z/" } ], "url": "https://git.kernel.org/stable/c/02f6b0e1ec7e0e7d059dddc893645816552039da" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284549", "reference_id": "2284549", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284549" }, { "reference_url": "https://git.kernel.org/stable/c/2d008d4961b039d2edce8976289773961b7e5fb5", "reference_id": "2d008d4961b039d2edce8976289773961b7e5fb5", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-10T18:48:31Z/" } ], "url": "https://git.kernel.org/stable/c/2d008d4961b039d2edce8976289773961b7e5fb5" }, { "reference_url": "https://git.kernel.org/stable/c/2dfbb920a89bdc58087672ad5325dc6c588b6860", "reference_id": "2dfbb920a89bdc58087672ad5325dc6c588b6860", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-10T18:48:31Z/" } ], "url": "https://git.kernel.org/stable/c/2dfbb920a89bdc58087672ad5325dc6c588b6860" }, { "reference_url": "https://git.kernel.org/stable/c/95ca7c90eaf5ea8a8460536535101e3e81160e2a", "reference_id": "95ca7c90eaf5ea8a8460536535101e3e81160e2a", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-10T18:48:31Z/" } ], "url": "https://git.kernel.org/stable/c/95ca7c90eaf5ea8a8460536535101e3e81160e2a" }, { "reference_url": "https://git.kernel.org/stable/c/ca710b5f40b8b16fdcad50bebd47f50e4c62d239", "reference_id": "ca710b5f40b8b16fdcad50bebd47f50e4c62d239", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-10T18:48:31Z/" } ], "url": "https://git.kernel.org/stable/c/ca710b5f40b8b16fdcad50bebd47f50e4c62d239" }, { "reference_url": "https://git.kernel.org/stable/c/d38c49f7bdf14381270736299e2ff68ec248a017", "reference_id": "d38c49f7bdf14381270736299e2ff68ec248a017", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-10T18:48:31Z/" } ], "url": "https://git.kernel.org/stable/c/d38c49f7bdf14381270736299e2ff68ec248a017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6997", "reference_id": "RHSA-2024:6997", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6997" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7004", "reference_id": "RHSA-2024:7004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7005", "reference_id": "RHSA-2024:7005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7005" }, { "reference_url": "https://usn.ubuntu.com/6949-1/", "reference_id": "USN-6949-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6949-1/" }, { "reference_url": "https://usn.ubuntu.com/6949-2/", "reference_id": "USN-6949-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6949-2/" }, { "reference_url": "https://usn.ubuntu.com/6952-1/", "reference_id": "USN-6952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6952-1/" }, { "reference_url": "https://usn.ubuntu.com/6952-2/", "reference_id": "USN-6952-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6952-2/" }, { "reference_url": "https://usn.ubuntu.com/6955-1/", "reference_id": "USN-6955-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6955-1/" }, { "reference_url": "https://usn.ubuntu.com/7387-1/", "reference_id": "USN-7387-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7387-1/" }, { "reference_url": "https://usn.ubuntu.com/7387-2/", "reference_id": "USN-7387-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7387-2/" }, { "reference_url": "https://usn.ubuntu.com/7387-3/", "reference_id": "USN-7387-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7387-3/" }, { "reference_url": "https://usn.ubuntu.com/7388-1/", "reference_id": "USN-7388-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7388-1/" }, { "reference_url": "https://usn.ubuntu.com/7389-1/", "reference_id": "USN-7389-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7389-1/" }, { "reference_url": "https://usn.ubuntu.com/7390-1/", "reference_id": "USN-7390-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7390-1/" }, { "reference_url": "https://usn.ubuntu.com/7407-1/", "reference_id": "USN-7407-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7407-1/" }, { "reference_url": "https://usn.ubuntu.com/7421-1/", "reference_id": "USN-7421-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7421-1/" }, { "reference_url": "https://usn.ubuntu.com/7458-1/", "reference_id": "USN-7458-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7458-1/" }, { "reference_url": "https://usn.ubuntu.com/7459-1/", "reference_id": "USN-7459-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7459-1/" }, { "reference_url": "https://usn.ubuntu.com/7459-2/", "reference_id": "USN-7459-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7459-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-36899" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-djgy-muty-mygk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74599?format=api", "vulnerability_id": "VCID-nhbr-efwv-f7fm", "summary": "kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41071.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41071.json" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300448", "reference_id": "2300448", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6990", "reference_id": "RHSA-2024:6990", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6990" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6991", "reference_id": "RHSA-2024:6991", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6991" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6992", "reference_id": "RHSA-2024:6992", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6992" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6993", "reference_id": "RHSA-2024:6993", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6993" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6994", "reference_id": "RHSA-2024:6994", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6994" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6995", "reference_id": "RHSA-2024:6995", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6995" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6997", "reference_id": "RHSA-2024:6997", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6997" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6998", "reference_id": "RHSA-2024:6998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6999", "reference_id": "RHSA-2024:6999", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6999" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7000", "reference_id": "RHSA-2024:7000", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7001", "reference_id": "RHSA-2024:7001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7002", "reference_id": "RHSA-2024:7002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7003", "reference_id": "RHSA-2024:7003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7004", "reference_id": "RHSA-2024:7004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7005", "reference_id": "RHSA-2024:7005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7227", "reference_id": "RHSA-2024:7227", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7227" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7427", "reference_id": "RHSA-2024:7427", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7427" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7428", "reference_id": "RHSA-2024:7428", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7428" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7429", "reference_id": "RHSA-2024:7429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7430", "reference_id": "RHSA-2024:7430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7431", "reference_id": "RHSA-2024:7431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7432", "reference_id": "RHSA-2024:7432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7433", "reference_id": "RHSA-2024:7433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7433" }, { "reference_url": "https://usn.ubuntu.com/7088-1/", "reference_id": "USN-7088-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-1/" }, { "reference_url": "https://usn.ubuntu.com/7088-2/", "reference_id": "USN-7088-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-2/" }, { "reference_url": "https://usn.ubuntu.com/7088-3/", "reference_id": "USN-7088-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-3/" }, { "reference_url": "https://usn.ubuntu.com/7088-4/", "reference_id": "USN-7088-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-4/" }, { "reference_url": "https://usn.ubuntu.com/7088-5/", "reference_id": "USN-7088-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-5/" }, { "reference_url": "https://usn.ubuntu.com/7089-1/", "reference_id": "USN-7089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7089-1/" }, { "reference_url": "https://usn.ubuntu.com/7089-2/", "reference_id": "USN-7089-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7089-2/" }, { "reference_url": "https://usn.ubuntu.com/7089-3/", "reference_id": "USN-7089-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7089-3/" }, { "reference_url": "https://usn.ubuntu.com/7089-4/", "reference_id": "USN-7089-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7089-4/" }, { "reference_url": "https://usn.ubuntu.com/7089-5/", "reference_id": "USN-7089-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7089-5/" }, { "reference_url": "https://usn.ubuntu.com/7089-6/", "reference_id": "USN-7089-6", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7089-6/" }, { "reference_url": "https://usn.ubuntu.com/7089-7/", "reference_id": "USN-7089-7", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7089-7/" }, { "reference_url": "https://usn.ubuntu.com/7090-1/", "reference_id": "USN-7090-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7090-1/" }, { "reference_url": "https://usn.ubuntu.com/7095-1/", "reference_id": "USN-7095-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7095-1/" }, { "reference_url": "https://usn.ubuntu.com/7100-1/", "reference_id": "USN-7100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7100-1/" }, { "reference_url": "https://usn.ubuntu.com/7100-2/", "reference_id": "USN-7100-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7100-2/" }, { "reference_url": "https://usn.ubuntu.com/7119-1/", "reference_id": "USN-7119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7119-1/" }, { "reference_url": "https://usn.ubuntu.com/7121-1/", "reference_id": "USN-7121-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7121-1/" }, { "reference_url": "https://usn.ubuntu.com/7121-2/", "reference_id": "USN-7121-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7121-2/" }, { "reference_url": "https://usn.ubuntu.com/7121-3/", "reference_id": "USN-7121-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7121-3/" }, { "reference_url": "https://usn.ubuntu.com/7123-1/", "reference_id": "USN-7123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7123-1/" }, { "reference_url": "https://usn.ubuntu.com/7144-1/", "reference_id": "USN-7144-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7144-1/" }, { "reference_url": "https://usn.ubuntu.com/7148-1/", "reference_id": "USN-7148-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7148-1/" }, { "reference_url": "https://usn.ubuntu.com/7156-1/", "reference_id": "USN-7156-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7156-1/" }, { "reference_url": "https://usn.ubuntu.com/7194-1/", "reference_id": "USN-7194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7194-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-41071" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nhbr-efwv-f7fm" } ], "fixing_vulnerabilities": [], "risk_score": "3.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-284.85.1%3Farch=el9_2" }