{"url":"http://public2.vulnerablecode.io/api/packages/93054?format=json","purl":"pkg:rpm/redhat/kernel-rt@5.14.0-284.96.1.rt14.381?arch=el9_2","type":"rpm","namespace":"redhat","name":"kernel-rt","version":"5.14.0-284.96.1.rt14.381","qualifiers":{"arch":"el9_2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75310?format=json","vulnerability_id":"VCID-45qm-naju-pycn","summary":"kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38564.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38564.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-38564","reference_id":"","reference_type":"","scores":[{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00923","published_at":"2026-05-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00874","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00928","published_at":"2026-04-21T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00931","published_at":"2026-05-05T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00935","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0093","published_at":"2026-04-29T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00926","published_at":"2026-05-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00885","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00886","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00888","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00892","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0089","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00879","published_at":"2026-04-18T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00872","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-38564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38564"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H"},{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293429","reference_id":"2293429","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293429"},{"reference_url":"https://git.kernel.org/stable/c/543576ec15b17c0c93301ac8297333c7b6e84ac7","reference_id":"543576ec15b17c0c93301ac8297333c7b6e84ac7","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T14:57:28Z/"}],"url":"https://git.kernel.org/stable/c/543576ec15b17c0c93301ac8297333c7b6e84ac7"},{"reference_url":"https://git.kernel.org/stable/c/6675c541f540a29487a802d3135280b69b9f568d","reference_id":"6675c541f540a29487a802d3135280b69b9f568d","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T14:57:28Z/"}],"url":"https://git.kernel.org/stable/c/6675c541f540a29487a802d3135280b69b9f568d"},{"reference_url":"https://git.kernel.org/stable/c/67929e973f5a347f05fef064fea4ae79e7cdb5fd","reference_id":"67929e973f5a347f05fef064fea4ae79e7cdb5fd","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T14:57:28Z/"}],"url":"https://git.kernel.org/stable/c/67929e973f5a347f05fef064fea4ae79e7cdb5fd"},{"reference_url":"https://git.kernel.org/stable/c/b34bbc76651065a5eafad8ddff1eb8d1f8473172","reference_id":"b34bbc76651065a5eafad8ddff1eb8d1f8473172","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T14:57:28Z/"}],"url":"https://git.kernel.org/stable/c/b34bbc76651065a5eafad8ddff1eb8d1f8473172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10262","reference_id":"RHSA-2024:10262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10262"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10281","reference_id":"RHSA-2024:10281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10282","reference_id":"RHSA-2024:10282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10945","reference_id":"RHSA-2024:10945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10946","reference_id":"RHSA-2024:10946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11486","reference_id":"RHSA-2024:11486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6297","reference_id":"RHSA-2024:6297","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6297"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9546","reference_id":"RHSA-2024:9546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9546"},{"reference_url":"https://usn.ubuntu.com/6949-1/","reference_id":"USN-6949-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6949-1/"},{"reference_url":"https://usn.ubuntu.com/6949-2/","reference_id":"USN-6949-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6949-2/"},{"reference_url":"https://usn.ubuntu.com/6952-1/","reference_id":"USN-6952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6952-1/"},{"reference_url":"https://usn.ubuntu.com/6952-2/","reference_id":"USN-6952-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6952-2/"},{"reference_url":"https://usn.ubuntu.com/6955-1/","reference_id":"USN-6955-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6955-1/"}],"fixed_packages":[],"aliases":["CVE-2024-38564"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45qm-naju-pycn"}],"fixing_vulnerabilities":[],"risk_score":"2.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-284.96.1.rt14.381%3Farch=el9_2"}