Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/92793?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/92793?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-372.124.1?arch=el8_6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "4.18.0-372.124.1", "qualifiers": { "arch": "el8_6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76695?format=api", "vulnerability_id": "VCID-3ea8-fwvn-7kb8", "summary": "kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48638.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48638.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48638", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04643", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04981", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04658", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.048", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04834", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04873", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04885", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04888", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04938", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04667", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0468", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04714", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04727", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04701", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04683", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0465", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48638" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/1e9571887f97b17cf3ffe9aa4da89090ea60988b", "reference_id": "1e9571887f97b17cf3ffe9aa4da89090ea60988b", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-16T20:40:33Z/" } ], "url": "https://git.kernel.org/stable/c/1e9571887f97b17cf3ffe9aa4da89090ea60988b" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277829", "reference_id": "2277829", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277829" }, { "reference_url": "https://git.kernel.org/stable/c/8484a356cee8ce3d6a8e6266ff99be326e9273ad", "reference_id": "8484a356cee8ce3d6a8e6266ff99be326e9273ad", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-16T20:40:33Z/" } ], "url": "https://git.kernel.org/stable/c/8484a356cee8ce3d6a8e6266ff99be326e9273ad" }, { "reference_url": "https://git.kernel.org/stable/c/df02452f3df069a59bc9e69c84435bf115cb6e37", "reference_id": "df02452f3df069a59bc9e69c84435bf115cb6e37", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-16T20:40:33Z/" } ], "url": "https://git.kernel.org/stable/c/df02452f3df069a59bc9e69c84435bf115cb6e37" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6993", "reference_id": "RHSA-2024:6993", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6993" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6998", "reference_id": "RHSA-2024:6998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6998" } ], "fixed_packages": [], "aliases": [ "CVE-2022-48638" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ea8-fwvn-7kb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77407?format=api", "vulnerability_id": "VCID-3ms7-4899-ukc9", "summary": "kernel: net: fix possible store tearing in neigh_periodic_work()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52522.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52522.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52522", "reference_id": "", "reference_type": "", "scores": [ { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00485", "published_at": "2026-04-02T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00503", "published_at": "2026-05-09T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00482", "published_at": "2026-04-04T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.0048", "published_at": "2026-04-07T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00477", "published_at": "2026-04-08T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00475", "published_at": "2026-04-09T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00476", "published_at": "2026-04-18T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00472", "published_at": "2026-04-12T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00473", "published_at": "2026-04-13T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00471", "published_at": "2026-04-16T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00508", "published_at": "2026-05-05T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00504", "published_at": "2026-04-29T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00505", "published_at": "2026-04-26T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00509", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52522" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/147d89ee41434b97043c2dcb17a97dc151859baa", "reference_id": "147d89ee41434b97043c2dcb17a97dc151859baa", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-05T20:28:00Z/" } ], "url": "https://git.kernel.org/stable/c/147d89ee41434b97043c2dcb17a97dc151859baa" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267795", "reference_id": "2267795", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267795" }, { "reference_url": "https://git.kernel.org/stable/c/25563b581ba3a1f263a00e8c9a97f5e7363be6fd", "reference_id": "25563b581ba3a1f263a00e8c9a97f5e7363be6fd", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-05T20:28:00Z/" } ], "url": "https://git.kernel.org/stable/c/25563b581ba3a1f263a00e8c9a97f5e7363be6fd" }, { "reference_url": "https://git.kernel.org/stable/c/2ea52a2fb8e87067e26bbab4efb8872639240eb0", "reference_id": "2ea52a2fb8e87067e26bbab4efb8872639240eb0", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-05T20:28:00Z/" } ], "url": "https://git.kernel.org/stable/c/2ea52a2fb8e87067e26bbab4efb8872639240eb0" }, { "reference_url": "https://git.kernel.org/stable/c/95eabb075a5902f4c0834ab1fb12dc35730c05af", "reference_id": "95eabb075a5902f4c0834ab1fb12dc35730c05af", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-05T20:28:00Z/" } ], "url": "https://git.kernel.org/stable/c/95eabb075a5902f4c0834ab1fb12dc35730c05af" }, { "reference_url": "https://git.kernel.org/stable/c/a75152d233370362eebedb2643592e7c883cc9fc", "reference_id": "a75152d233370362eebedb2643592e7c883cc9fc", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-05T20:28:00Z/" } ], "url": "https://git.kernel.org/stable/c/a75152d233370362eebedb2643592e7c883cc9fc" }, { "reference_url": "https://git.kernel.org/stable/c/f82aac8162871e87027692b36af335a2375d4580", "reference_id": "f82aac8162871e87027692b36af335a2375d4580", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-05T20:28:00Z/" } ], "url": "https://git.kernel.org/stable/c/f82aac8162871e87027692b36af335a2375d4580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6993", "reference_id": "RHSA-2024:6993", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6993" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6998", "reference_id": "RHSA-2024:6998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7000", "reference_id": "RHSA-2024:7000", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7001", "reference_id": "RHSA-2024:7001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9497", "reference_id": "RHSA-2024:9497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9498", "reference_id": "RHSA-2024:9498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9498" }, { "reference_url": "https://usn.ubuntu.com/7332-1/", "reference_id": "USN-7332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7332-1/" }, { "reference_url": "https://usn.ubuntu.com/7332-2/", "reference_id": "USN-7332-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7332-2/" }, { "reference_url": "https://usn.ubuntu.com/7332-3/", "reference_id": "USN-7332-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7332-3/" }, { "reference_url": "https://usn.ubuntu.com/7342-1/", "reference_id": "USN-7342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7342-1/" }, { "reference_url": "https://usn.ubuntu.com/7344-1/", "reference_id": "USN-7344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7344-1/" }, { "reference_url": "https://usn.ubuntu.com/7344-2/", "reference_id": "USN-7344-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7344-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-52522" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ms7-4899-ukc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77004?format=api", "vulnerability_id": "VCID-8ry8-z6kv-jfgu", "summary": "kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26686.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26686.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26686", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01172", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01043", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01052", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.0117", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01171", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01178", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01176", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01175", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01109", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01113", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01063", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01069", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01068", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01053", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01048", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26686" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/0c35d1914353799c54fa1843fe7dea6fcbcdbac5", "reference_id": "0c35d1914353799c54fa1843fe7dea6fcbcdbac5", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-03T18:03:13Z/" } ], "url": "https://git.kernel.org/stable/c/0c35d1914353799c54fa1843fe7dea6fcbcdbac5" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273109", "reference_id": "2273109", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273109" }, { "reference_url": "https://git.kernel.org/stable/c/27978243f165b44e342f28f449b91327944ea071", "reference_id": "27978243f165b44e342f28f449b91327944ea071", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-03T18:03:13Z/" } ], "url": "https://git.kernel.org/stable/c/27978243f165b44e342f28f449b91327944ea071" }, { "reference_url": "https://git.kernel.org/stable/c/3820b0fac7732a653bcc6f6ac20c1d72e697f8f6", "reference_id": "3820b0fac7732a653bcc6f6ac20c1d72e697f8f6", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-03T18:03:13Z/" } ], "url": "https://git.kernel.org/stable/c/3820b0fac7732a653bcc6f6ac20c1d72e697f8f6" }, { "reference_url": "https://git.kernel.org/stable/c/4fe85bdaabd63f8f8579b24a10ed597c9c482164", "reference_id": "4fe85bdaabd63f8f8579b24a10ed597c9c482164", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-03T18:03:13Z/" } ], "url": "https://git.kernel.org/stable/c/4fe85bdaabd63f8f8579b24a10ed597c9c482164" }, { "reference_url": "https://git.kernel.org/stable/c/7601df8031fd67310af891897ef6cc0df4209305", "reference_id": "7601df8031fd67310af891897ef6cc0df4209305", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-03T18:03:13Z/" } ], "url": "https://git.kernel.org/stable/c/7601df8031fd67310af891897ef6cc0df4209305" }, { "reference_url": "https://git.kernel.org/stable/c/cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d", "reference_id": "cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-03T18:03:13Z/" } ], "url": "https://git.kernel.org/stable/c/cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10771", "reference_id": "RHSA-2024:10771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5101", "reference_id": "RHSA-2024:5101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5102", "reference_id": "RHSA-2024:5102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5102" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5255", "reference_id": "RHSA-2024:5255", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5255" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6998", "reference_id": "RHSA-2024:6998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8613", "reference_id": "RHSA-2024:8613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8614", "reference_id": "RHSA-2024:8614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9315", "reference_id": "RHSA-2024:9315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "reference_url": "https://usn.ubuntu.com/7654-1/", "reference_id": "USN-7654-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7654-1/" }, { "reference_url": "https://usn.ubuntu.com/7654-2/", "reference_id": "USN-7654-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7654-2/" }, { "reference_url": "https://usn.ubuntu.com/7654-3/", "reference_id": "USN-7654-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7654-3/" }, { "reference_url": "https://usn.ubuntu.com/7654-4/", "reference_id": "USN-7654-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7654-4/" }, { "reference_url": "https://usn.ubuntu.com/7654-5/", "reference_id": "USN-7654-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7654-5/" }, { "reference_url": "https://usn.ubuntu.com/7655-1/", "reference_id": "USN-7655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7655-1/" }, { "reference_url": "https://usn.ubuntu.com/7686-1/", "reference_id": "USN-7686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7686-1/" }, { "reference_url": "https://usn.ubuntu.com/7711-1/", "reference_id": "USN-7711-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7711-1/" }, { "reference_url": "https://usn.ubuntu.com/7712-1/", "reference_id": "USN-7712-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7712-1/" }, { "reference_url": "https://usn.ubuntu.com/7712-2/", "reference_id": "USN-7712-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7712-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-26686" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ry8-z6kv-jfgu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74599?format=api", "vulnerability_id": "VCID-nhbr-efwv-f7fm", "summary": "kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41071.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41071.json" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300448", "reference_id": "2300448", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6990", "reference_id": "RHSA-2024:6990", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6990" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6991", "reference_id": "RHSA-2024:6991", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6991" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6992", "reference_id": "RHSA-2024:6992", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6992" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6993", "reference_id": "RHSA-2024:6993", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6993" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6994", "reference_id": "RHSA-2024:6994", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6994" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6995", "reference_id": "RHSA-2024:6995", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6995" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6997", "reference_id": "RHSA-2024:6997", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6997" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6998", "reference_id": "RHSA-2024:6998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6999", "reference_id": "RHSA-2024:6999", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6999" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7000", "reference_id": "RHSA-2024:7000", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7001", "reference_id": "RHSA-2024:7001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7002", "reference_id": "RHSA-2024:7002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7003", "reference_id": "RHSA-2024:7003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7004", "reference_id": "RHSA-2024:7004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7005", "reference_id": "RHSA-2024:7005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7227", "reference_id": "RHSA-2024:7227", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7227" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7427", "reference_id": "RHSA-2024:7427", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7427" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7428", "reference_id": "RHSA-2024:7428", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7428" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7429", "reference_id": "RHSA-2024:7429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7430", "reference_id": "RHSA-2024:7430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7431", "reference_id": "RHSA-2024:7431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7432", "reference_id": "RHSA-2024:7432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7433", "reference_id": "RHSA-2024:7433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7433" }, { "reference_url": "https://usn.ubuntu.com/7088-1/", "reference_id": "USN-7088-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-1/" }, { "reference_url": "https://usn.ubuntu.com/7088-2/", "reference_id": "USN-7088-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-2/" }, { "reference_url": "https://usn.ubuntu.com/7088-3/", "reference_id": "USN-7088-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-3/" }, { "reference_url": "https://usn.ubuntu.com/7088-4/", "reference_id": "USN-7088-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-4/" }, { "reference_url": "https://usn.ubuntu.com/7088-5/", "reference_id": "USN-7088-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-5/" }, { "reference_url": "https://usn.ubuntu.com/7089-1/", "reference_id": "USN-7089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7089-1/" }, { "reference_url": "https://usn.ubuntu.com/7089-2/", "reference_id": "USN-7089-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7089-2/" }, { "reference_url": "https://usn.ubuntu.com/7089-3/", "reference_id": "USN-7089-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7089-3/" }, { "reference_url": "https://usn.ubuntu.com/7089-4/", "reference_id": "USN-7089-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7089-4/" }, { "reference_url": "https://usn.ubuntu.com/7089-5/", "reference_id": "USN-7089-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7089-5/" }, { "reference_url": "https://usn.ubuntu.com/7089-6/", "reference_id": "USN-7089-6", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7089-6/" }, { "reference_url": "https://usn.ubuntu.com/7089-7/", "reference_id": "USN-7089-7", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7089-7/" }, { "reference_url": "https://usn.ubuntu.com/7090-1/", "reference_id": "USN-7090-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7090-1/" }, { "reference_url": "https://usn.ubuntu.com/7095-1/", "reference_id": "USN-7095-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7095-1/" }, { "reference_url": "https://usn.ubuntu.com/7100-1/", "reference_id": "USN-7100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7100-1/" }, { "reference_url": "https://usn.ubuntu.com/7100-2/", "reference_id": "USN-7100-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7100-2/" }, { "reference_url": "https://usn.ubuntu.com/7119-1/", "reference_id": "USN-7119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7119-1/" }, { "reference_url": "https://usn.ubuntu.com/7121-1/", "reference_id": "USN-7121-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7121-1/" }, { "reference_url": "https://usn.ubuntu.com/7121-2/", "reference_id": "USN-7121-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7121-2/" }, { "reference_url": "https://usn.ubuntu.com/7121-3/", "reference_id": "USN-7121-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7121-3/" }, { "reference_url": "https://usn.ubuntu.com/7123-1/", "reference_id": "USN-7123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7123-1/" }, { "reference_url": "https://usn.ubuntu.com/7144-1/", "reference_id": "USN-7144-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7144-1/" }, { "reference_url": "https://usn.ubuntu.com/7148-1/", "reference_id": "USN-7148-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7148-1/" }, { "reference_url": "https://usn.ubuntu.com/7156-1/", "reference_id": "USN-7156-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7156-1/" }, { "reference_url": "https://usn.ubuntu.com/7194-1/", "reference_id": "USN-7194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7194-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-41071" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nhbr-efwv-f7fm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75484?format=api", "vulnerability_id": "VCID-tqem-8n6r-ybhx", "summary": "kernel: mptcp: ensure snd_nxt is properly initialized on connect", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36889.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36889.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36889", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01051", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.00984", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01042", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01041", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01045", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01047", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01052", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01049", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.0099", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.00991", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.00999", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01003", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.00986", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.0098", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.00979", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.00974", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52882", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52882" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27401", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27401" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35848", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35848" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35947", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35947" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36883", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36883" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36889", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36904", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36904" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36905" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36941", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36941" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36954", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36954" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36957", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36957" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36959" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284571", "reference_id": "2284571", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284571" }, { "reference_url": "https://git.kernel.org/stable/c/39ca83ed73db9edcc6d70c0dc7a73085a4725012", "reference_id": "39ca83ed73db9edcc6d70c0dc7a73085a4725012", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:29:56Z/" } ], "url": "https://git.kernel.org/stable/c/39ca83ed73db9edcc6d70c0dc7a73085a4725012" }, { "reference_url": "https://git.kernel.org/stable/c/592f69b41766d366dbb8ff4ef5a67c4396527bbe", "reference_id": "592f69b41766d366dbb8ff4ef5a67c4396527bbe", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:29:56Z/" } ], "url": "https://git.kernel.org/stable/c/592f69b41766d366dbb8ff4ef5a67c4396527bbe" }, { "reference_url": "https://git.kernel.org/stable/c/99951b62bf20cec9247f633a3bea898338b9e5b4", "reference_id": "99951b62bf20cec9247f633a3bea898338b9e5b4", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:29:56Z/" } ], "url": "https://git.kernel.org/stable/c/99951b62bf20cec9247f633a3bea898338b9e5b4" }, { "reference_url": "https://git.kernel.org/stable/c/aa0c07c1f20e05b30019bff083ec43665536f06f", "reference_id": "aa0c07c1f20e05b30019bff083ec43665536f06f", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:29:56Z/" } ], "url": "https://git.kernel.org/stable/c/aa0c07c1f20e05b30019bff083ec43665536f06f" }, { "reference_url": "https://git.kernel.org/stable/c/dc941fec0719d0471a5902424d6b2a17df233193", "reference_id": "dc941fec0719d0471a5902424d6b2a17df233193", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:29:56Z/" } ], "url": "https://git.kernel.org/stable/c/dc941fec0719d0471a5902424d6b2a17df233193" }, { "reference_url": "https://git.kernel.org/stable/c/fb7a0d334894206ae35f023a82cad5a290fd7386", "reference_id": "fb7a0d334894206ae35f023a82cad5a290fd7386", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:29:56Z/" } ], "url": "https://git.kernel.org/stable/c/fb7a0d334894206ae35f023a82cad5a290fd7386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10262", "reference_id": "RHSA-2024:10262", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10262" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5101", "reference_id": "RHSA-2024:5101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5102", "reference_id": "RHSA-2024:5102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5102" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6998", "reference_id": "RHSA-2024:6998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8162", "reference_id": "RHSA-2024:8162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8613", "reference_id": "RHSA-2024:8613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8614", "reference_id": "RHSA-2024:8614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8614" }, { "reference_url": "https://usn.ubuntu.com/6949-1/", "reference_id": "USN-6949-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6949-1/" }, { "reference_url": "https://usn.ubuntu.com/6949-2/", "reference_id": "USN-6949-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6949-2/" }, { "reference_url": "https://usn.ubuntu.com/6950-1/", "reference_id": "USN-6950-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6950-1/" }, { "reference_url": "https://usn.ubuntu.com/6950-2/", "reference_id": "USN-6950-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6950-2/" }, { "reference_url": "https://usn.ubuntu.com/6950-3/", "reference_id": "USN-6950-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6950-3/" }, { "reference_url": "https://usn.ubuntu.com/6950-4/", "reference_id": "USN-6950-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6950-4/" }, { "reference_url": "https://usn.ubuntu.com/6952-1/", "reference_id": "USN-6952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6952-1/" }, { "reference_url": "https://usn.ubuntu.com/6952-2/", "reference_id": "USN-6952-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6952-2/" }, { "reference_url": "https://usn.ubuntu.com/6955-1/", "reference_id": "USN-6955-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6955-1/" }, { "reference_url": "https://usn.ubuntu.com/6956-1/", "reference_id": "USN-6956-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6956-1/" }, { "reference_url": "https://usn.ubuntu.com/6957-1/", "reference_id": "USN-6957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6957-1/" }, { "reference_url": "https://usn.ubuntu.com/7019-1/", "reference_id": "USN-7019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7019-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-36889" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tqem-8n6r-ybhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76449?format=api", "vulnerability_id": "VCID-ug4z-71sn-1fch", "summary": "kernel: nvme-tcp: fix UAF when detecting digest errors", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48686.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48686.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48686", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08298", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08452", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08367", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08348", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08228", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08214", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08376", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08346", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08309", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08275", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08244", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08382", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08351", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08295", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08358", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08375", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48686" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/13c80a6c112467bab5e44d090767930555fc17a5", "reference_id": "13c80a6c112467bab5e44d090767930555fc17a5", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:58Z/" } ], "url": "https://git.kernel.org/stable/c/13c80a6c112467bab5e44d090767930555fc17a5" }, { "reference_url": "https://git.kernel.org/stable/c/160f3549a907a50e51a8518678ba2dcf2541abea", "reference_id": "160f3549a907a50e51a8518678ba2dcf2541abea", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:58Z/" } ], "url": "https://git.kernel.org/stable/c/160f3549a907a50e51a8518678ba2dcf2541abea" }, { "reference_url": "https://git.kernel.org/stable/c/19816a0214684f70b49b25075ff8c402fdd611d3", "reference_id": "19816a0214684f70b49b25075ff8c402fdd611d3", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:58Z/" } ], "url": "https://git.kernel.org/stable/c/19816a0214684f70b49b25075ff8c402fdd611d3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278931", "reference_id": "2278931", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278931" }, { "reference_url": "https://git.kernel.org/stable/c/5914fa32ef1b7766fea933f9eed94ac5c00aa7ff", "reference_id": "5914fa32ef1b7766fea933f9eed94ac5c00aa7ff", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:58Z/" } ], "url": "https://git.kernel.org/stable/c/5914fa32ef1b7766fea933f9eed94ac5c00aa7ff" }, { "reference_url": "https://git.kernel.org/stable/c/c3eb461aa56e6fa94fb80442ba2586bd223a8886", "reference_id": "c3eb461aa56e6fa94fb80442ba2586bd223a8886", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:58Z/" } ], "url": "https://git.kernel.org/stable/c/c3eb461aa56e6fa94fb80442ba2586bd223a8886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10262", "reference_id": "RHSA-2024:10262", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10262" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6998", "reference_id": "RHSA-2024:6998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6998" } ], "fixed_packages": [], "aliases": [ "CVE-2022-48686" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ug4z-71sn-1fch" } ], "fixing_vulnerabilities": [], "risk_score": "2.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.124.1%3Farch=el8_6" }