Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/93176?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/93176?format=api", "purl": "pkg:rpm/redhat/kernel@5.14.0-284.71.1?arch=el9_2", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "5.14.0-284.71.1", "qualifiers": { "arch": "el9_2" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76236?format=api", "vulnerability_id": "VCID-5m1x-wksg-mbbz", "summary": "kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27403.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27403.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27403", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03615", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03456", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0358", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03587", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03593", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03638", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03595", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03535", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03545", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03546", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03569", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03525", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03496", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03471", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03444", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27403" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27403", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27403" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/012df10717da02367aaf92c65f9c89db206c15f4", "reference_id": "012df10717da02367aaf92c65f9c89db206c15f4", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-17T17:17:07Z/" } ], "url": "https://git.kernel.org/stable/c/012df10717da02367aaf92c65f9c89db206c15f4" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281127", "reference_id": "2281127", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281127" }, { "reference_url": "https://git.kernel.org/stable/c/4c167af9f6b5ae4a5dbc243d5983c295ccc2e43c", "reference_id": "4c167af9f6b5ae4a5dbc243d5983c295ccc2e43c", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-17T17:17:07Z/" } ], "url": "https://git.kernel.org/stable/c/4c167af9f6b5ae4a5dbc243d5983c295ccc2e43c" }, { "reference_url": "https://git.kernel.org/stable/c/558b00a30e05753a62ecc7e05e939ca8f0241148", "reference_id": "558b00a30e05753a62ecc7e05e939ca8f0241148", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-17T17:17:07Z/" } ], "url": "https://git.kernel.org/stable/c/558b00a30e05753a62ecc7e05e939ca8f0241148" }, { "reference_url": "https://git.kernel.org/stable/c/670548c8db44d76e40e1dfc06812bca36a61e9ae", "reference_id": "670548c8db44d76e40e1dfc06812bca36a61e9ae", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-17T17:17:07Z/" } ], "url": "https://git.kernel.org/stable/c/670548c8db44d76e40e1dfc06812bca36a61e9ae" }, { "reference_url": "https://git.kernel.org/stable/c/9e0f0430389be7696396c62f037be4bf72cf93e3", "reference_id": "9e0f0430389be7696396c62f037be4bf72cf93e3", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-17T17:17:07Z/" } ], "url": "https://git.kernel.org/stable/c/9e0f0430389be7696396c62f037be4bf72cf93e3" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4106", "reference_id": "RHSA-2024:4106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4108", "reference_id": "RHSA-2024:4108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5256", "reference_id": "RHSA-2024:5256", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5256" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5257", "reference_id": "RHSA-2024:5257", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5257" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8162", "reference_id": "RHSA-2024:8162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8162" }, { "reference_url": "https://usn.ubuntu.com/6820-1/", "reference_id": "USN-6820-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6820-1/" }, { "reference_url": "https://usn.ubuntu.com/6820-2/", "reference_id": "USN-6820-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6820-2/" }, { "reference_url": "https://usn.ubuntu.com/6821-1/", "reference_id": "USN-6821-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6821-1/" }, { "reference_url": "https://usn.ubuntu.com/6821-2/", "reference_id": "USN-6821-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6821-2/" }, { "reference_url": "https://usn.ubuntu.com/6821-3/", "reference_id": "USN-6821-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6821-3/" }, { "reference_url": "https://usn.ubuntu.com/6821-4/", "reference_id": "USN-6821-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6821-4/" }, { "reference_url": "https://usn.ubuntu.com/6828-1/", "reference_id": "USN-6828-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6828-1/" }, { "reference_url": "https://usn.ubuntu.com/6871-1/", "reference_id": "USN-6871-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6871-1/" }, { "reference_url": "https://usn.ubuntu.com/6892-1/", "reference_id": "USN-6892-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6892-1/" }, { "reference_url": "https://usn.ubuntu.com/6919-1/", "reference_id": "USN-6919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6919-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-27403" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5m1x-wksg-mbbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76082?format=api", "vulnerability_id": "VCID-8nsp-v995-vbbz", "summary": "kernel: net: ena: Fix incorrect descriptor free behavior", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35958.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35958.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-35958", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08532", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08408", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0848", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08498", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08492", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08472", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08458", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08351", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08335", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08493", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08487", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08451", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08441", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08389", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08489", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-35958" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35958", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35958" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/19ff8fed3338898b70b2aad831386c78564912e1", "reference_id": "19ff8fed3338898b70b2aad831386c78564912e1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T18:17:10Z/" } ], "url": "https://git.kernel.org/stable/c/19ff8fed3338898b70b2aad831386c78564912e1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281925", "reference_id": "2281925", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281925" }, { "reference_url": "https://git.kernel.org/stable/c/5c7f2240d9835a7823d87f7460d8eae9f4e504c7", "reference_id": "5c7f2240d9835a7823d87f7460d8eae9f4e504c7", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T18:17:10Z/" } ], "url": "https://git.kernel.org/stable/c/5c7f2240d9835a7823d87f7460d8eae9f4e504c7" }, { "reference_url": "https://git.kernel.org/stable/c/b26aa765f7437e1bbe8db4c1641b12bd5dd378f0", "reference_id": "b26aa765f7437e1bbe8db4c1641b12bd5dd378f0", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T18:17:10Z/" } ], "url": "https://git.kernel.org/stable/c/b26aa765f7437e1bbe8db4c1641b12bd5dd378f0" }, { "reference_url": "https://git.kernel.org/stable/c/bf02d9fe00632d22fa91d34749c7aacf397b6cde", "reference_id": "bf02d9fe00632d22fa91d34749c7aacf397b6cde", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T18:17:10Z/" } ], "url": "https://git.kernel.org/stable/c/bf02d9fe00632d22fa91d34749c7aacf397b6cde" }, { "reference_url": "https://git.kernel.org/stable/c/c31baa07f01307b7ae05f3ce32b89d8e2ba0cc1d", "reference_id": "c31baa07f01307b7ae05f3ce32b89d8e2ba0cc1d", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T18:17:10Z/" } ], "url": "https://git.kernel.org/stable/c/c31baa07f01307b7ae05f3ce32b89d8e2ba0cc1d" }, { "reference_url": "https://git.kernel.org/stable/c/fdfbf54d128ab6ab255db138488f9650485795a2", "reference_id": "fdfbf54d128ab6ab255db138488f9650485795a2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T18:17:10Z/" } ], "url": "https://git.kernel.org/stable/c/fdfbf54d128ab6ab255db138488f9650485795a2" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4106", "reference_id": "RHSA-2024:4106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4108", "reference_id": "RHSA-2024:4108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4211", "reference_id": "RHSA-2024:4211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4352", "reference_id": "RHSA-2024:4352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4447", "reference_id": "RHSA-2024:4447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4583", "reference_id": "RHSA-2024:4583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4740", "reference_id": "RHSA-2024:4740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4740" }, { "reference_url": "https://usn.ubuntu.com/6893-1/", "reference_id": "USN-6893-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6893-1/" }, { "reference_url": "https://usn.ubuntu.com/6893-2/", "reference_id": "USN-6893-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6893-2/" }, { "reference_url": "https://usn.ubuntu.com/6893-3/", "reference_id": "USN-6893-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6893-3/" }, { "reference_url": "https://usn.ubuntu.com/6898-1/", "reference_id": "USN-6898-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-1/" }, { "reference_url": "https://usn.ubuntu.com/6898-2/", "reference_id": "USN-6898-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-2/" }, { "reference_url": "https://usn.ubuntu.com/6898-3/", "reference_id": "USN-6898-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-3/" }, { "reference_url": "https://usn.ubuntu.com/6898-4/", "reference_id": "USN-6898-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-4/" }, { "reference_url": "https://usn.ubuntu.com/6917-1/", "reference_id": "USN-6917-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6917-1/" }, { "reference_url": "https://usn.ubuntu.com/6918-1/", "reference_id": "USN-6918-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6918-1/" }, { "reference_url": "https://usn.ubuntu.com/6919-1/", "reference_id": "USN-6919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6919-1/" }, { "reference_url": "https://usn.ubuntu.com/6927-1/", "reference_id": "USN-6927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6927-1/" }, { "reference_url": "https://usn.ubuntu.com/7019-1/", "reference_id": "USN-7019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7019-1/" }, { "reference_url": "https://usn.ubuntu.com/7461-1/", "reference_id": "USN-7461-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7461-1/" }, { "reference_url": "https://usn.ubuntu.com/7461-2/", "reference_id": "USN-7461-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7461-2/" }, { "reference_url": "https://usn.ubuntu.com/7461-3/", "reference_id": "USN-7461-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7461-3/" }, { "reference_url": "https://usn.ubuntu.com/7462-1/", "reference_id": "USN-7462-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7462-1/" }, { "reference_url": "https://usn.ubuntu.com/7462-2/", "reference_id": "USN-7462-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7462-2/" }, { "reference_url": "https://usn.ubuntu.com/7463-1/", "reference_id": "USN-7463-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7463-1/" }, { "reference_url": "https://usn.ubuntu.com/7539-1/", "reference_id": "USN-7539-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7539-1/" }, { "reference_url": "https://usn.ubuntu.com/7540-1/", "reference_id": "USN-7540-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7540-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-35958" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8nsp-v995-vbbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4381?format=api", "vulnerability_id": "VCID-ayru-t6ft-d7er", "summary": "Linux/xen-netfront: Memory leak due to missing cleanup function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27393.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27393.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27393", "reference_id": "", "reference_type": "", "scores": [ { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00608", "published_at": "2026-05-07T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00575", "published_at": "2026-04-07T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00574", "published_at": "2026-04-08T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00567", "published_at": "2026-04-09T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00568", "published_at": "2026-04-11T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00566", "published_at": "2026-04-18T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00562", "published_at": "2026-04-16T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00604", "published_at": "2026-04-29T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00601", "published_at": "2026-04-24T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00603", "published_at": "2026-04-26T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00611", "published_at": "2026-05-05T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00581", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27393" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27393", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27393" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/037965402a010898d34f4e35327d22c0a95cd51f", "reference_id": "037965402a010898d34f4e35327d22c0a95cd51f", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-31T18:36:32Z/" } ], "url": "https://git.kernel.org/stable/c/037965402a010898d34f4e35327d22c0a95cd51f" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280745", "reference_id": "2280745", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280745" }, { "reference_url": "https://git.kernel.org/stable/c/27aa3e4b3088426b7e34584274ad45b5afaf7629", "reference_id": "27aa3e4b3088426b7e34584274ad45b5afaf7629", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-31T18:36:32Z/" } ], "url": "https://git.kernel.org/stable/c/27aa3e4b3088426b7e34584274ad45b5afaf7629" }, { "reference_url": "https://git.kernel.org/stable/c/4143b9479caa29bb2380f3620dcbe16ea84eb3b1", "reference_id": "4143b9479caa29bb2380f3620dcbe16ea84eb3b1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-31T18:36:32Z/" } ], "url": "https://git.kernel.org/stable/c/4143b9479caa29bb2380f3620dcbe16ea84eb3b1" }, { "reference_url": "https://git.kernel.org/stable/c/7c1250796b6c262b505a46192f4716b8c6a6a8c6", "reference_id": "7c1250796b6c262b505a46192f4716b8c6a6a8c6", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-31T18:36:32Z/" } ], "url": "https://git.kernel.org/stable/c/7c1250796b6c262b505a46192f4716b8c6a6a8c6" }, { "reference_url": "https://git.kernel.org/stable/c/c8b7b2f158d9d4fb89cd2f68244af154f7549bb4", "reference_id": "c8b7b2f158d9d4fb89cd2f68244af154f7549bb4", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-31T18:36:32Z/" } ], "url": "https://git.kernel.org/stable/c/c8b7b2f158d9d4fb89cd2f68244af154f7549bb4" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4106", "reference_id": "RHSA-2024:4106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4108", "reference_id": "RHSA-2024:4108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4349", "reference_id": "RHSA-2024:4349", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4349" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5257", "reference_id": "RHSA-2024:5257", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5257" }, { "reference_url": "https://usn.ubuntu.com/6898-1/", "reference_id": "USN-6898-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-1/" }, { "reference_url": "https://usn.ubuntu.com/6898-2/", "reference_id": "USN-6898-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-2/" }, { "reference_url": "https://usn.ubuntu.com/6898-3/", "reference_id": "USN-6898-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-3/" }, { "reference_url": "https://usn.ubuntu.com/6898-4/", "reference_id": "USN-6898-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-4/" }, { "reference_url": "https://usn.ubuntu.com/6917-1/", "reference_id": "USN-6917-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6917-1/" }, { "reference_url": "https://usn.ubuntu.com/6919-1/", "reference_id": "USN-6919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6919-1/" }, { "reference_url": "https://usn.ubuntu.com/6927-1/", "reference_id": "USN-6927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6927-1/" }, { "reference_url": "https://usn.ubuntu.com/7019-1/", "reference_id": "USN-7019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7019-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-457.html", "reference_id": "XSA-457", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-457.html" } ], "fixed_packages": [], "aliases": [ "CVE-2024-27393" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ayru-t6ft-d7er" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76075?format=api", "vulnerability_id": "VCID-bk34-68fb-sfaw", "summary": "kernel: net/mlx5: Properly link new fs rules into the tree", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35960.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35960.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-35960", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82666", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82489", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82507", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82504", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.8253", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82538", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82556", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82552", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82547", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82583", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82587", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82609", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82619", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82625", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01748", "scoring_system": "epss", "scoring_elements": "0.82645", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-35960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35960" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/1263b0b26077b1183c3c45a0a2479573a351d423", "reference_id": "1263b0b26077b1183c3c45a0a2479573a351d423", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-16T21:09:41Z/" } ], "url": "https://git.kernel.org/stable/c/1263b0b26077b1183c3c45a0a2479573a351d423" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281920", "reference_id": "2281920", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281920" }, { "reference_url": "https://git.kernel.org/stable/c/2e8dc5cffc844dacfa79f056dea88002312f253f", "reference_id": "2e8dc5cffc844dacfa79f056dea88002312f253f", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-16T21:09:41Z/" } ], "url": "https://git.kernel.org/stable/c/2e8dc5cffc844dacfa79f056dea88002312f253f" }, { "reference_url": "https://git.kernel.org/stable/c/3d90ca9145f6b97b38d0c2b6b30f6ca6af9c1801", "reference_id": "3d90ca9145f6b97b38d0c2b6b30f6ca6af9c1801", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-16T21:09:41Z/" } ], "url": "https://git.kernel.org/stable/c/3d90ca9145f6b97b38d0c2b6b30f6ca6af9c1801" }, { "reference_url": "https://git.kernel.org/stable/c/5cf5337ef701830f173b4eec00a4f984adeb57a0", "reference_id": "5cf5337ef701830f173b4eec00a4f984adeb57a0", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-16T21:09:41Z/" } ], "url": "https://git.kernel.org/stable/c/5cf5337ef701830f173b4eec00a4f984adeb57a0" }, { "reference_url": "https://git.kernel.org/stable/c/7aaee12b804c5e0374e7b132b6ec2158ff33dd64", "reference_id": "7aaee12b804c5e0374e7b132b6ec2158ff33dd64", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-16T21:09:41Z/" } ], "url": "https://git.kernel.org/stable/c/7aaee12b804c5e0374e7b132b6ec2158ff33dd64" }, { "reference_url": "https://git.kernel.org/stable/c/7c6782ad4911cbee874e85630226ed389ff2e453", "reference_id": "7c6782ad4911cbee874e85630226ed389ff2e453", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-16T21:09:41Z/" } ], "url": "https://git.kernel.org/stable/c/7c6782ad4911cbee874e85630226ed389ff2e453" }, { "reference_url": "https://git.kernel.org/stable/c/adf67a03af39095f05d82050f15813d6f700159d", "reference_id": "adf67a03af39095f05d82050f15813d6f700159d", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-16T21:09:41Z/" } ], "url": "https://git.kernel.org/stable/c/adf67a03af39095f05d82050f15813d6f700159d" }, { "reference_url": "https://git.kernel.org/stable/c/de0139719cdda82806a47580ca0df06fc85e0bd2", "reference_id": "de0139719cdda82806a47580ca0df06fc85e0bd2", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-16T21:09:41Z/" } ], "url": "https://git.kernel.org/stable/c/de0139719cdda82806a47580ca0df06fc85e0bd2" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4106", "reference_id": "RHSA-2024:4106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4108", "reference_id": "RHSA-2024:4108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4211", "reference_id": "RHSA-2024:4211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4349", "reference_id": "RHSA-2024:4349", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4349" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4352", "reference_id": "RHSA-2024:4352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4740", "reference_id": "RHSA-2024:4740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4902", "reference_id": "RHSA-2024:4902", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4902" }, { "reference_url": "https://usn.ubuntu.com/6893-1/", "reference_id": "USN-6893-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6893-1/" }, { "reference_url": "https://usn.ubuntu.com/6893-2/", "reference_id": "USN-6893-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6893-2/" }, { "reference_url": "https://usn.ubuntu.com/6893-3/", "reference_id": "USN-6893-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6893-3/" }, { "reference_url": "https://usn.ubuntu.com/6896-1/", "reference_id": "USN-6896-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6896-1/" }, { "reference_url": "https://usn.ubuntu.com/6896-2/", "reference_id": "USN-6896-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6896-2/" }, { "reference_url": "https://usn.ubuntu.com/6896-3/", "reference_id": "USN-6896-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6896-3/" }, { "reference_url": "https://usn.ubuntu.com/6896-4/", "reference_id": "USN-6896-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6896-4/" }, { "reference_url": "https://usn.ubuntu.com/6896-5/", "reference_id": "USN-6896-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6896-5/" }, { "reference_url": "https://usn.ubuntu.com/6898-1/", "reference_id": "USN-6898-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-1/" }, { "reference_url": "https://usn.ubuntu.com/6898-2/", "reference_id": "USN-6898-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-2/" }, { "reference_url": "https://usn.ubuntu.com/6898-3/", "reference_id": "USN-6898-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-3/" }, { "reference_url": "https://usn.ubuntu.com/6898-4/", "reference_id": "USN-6898-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-4/" }, { "reference_url": "https://usn.ubuntu.com/6917-1/", "reference_id": "USN-6917-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6917-1/" }, { "reference_url": "https://usn.ubuntu.com/6918-1/", "reference_id": "USN-6918-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6918-1/" }, { "reference_url": "https://usn.ubuntu.com/6919-1/", "reference_id": "USN-6919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6919-1/" }, { "reference_url": "https://usn.ubuntu.com/6927-1/", "reference_id": "USN-6927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6927-1/" }, { "reference_url": "https://usn.ubuntu.com/7019-1/", "reference_id": "USN-7019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7019-1/" }, { "reference_url": "https://usn.ubuntu.com/7428-1/", "reference_id": "USN-7428-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7428-1/" }, { "reference_url": "https://usn.ubuntu.com/7428-2/", "reference_id": "USN-7428-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7428-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-35960" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bk34-68fb-sfaw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75695?format=api", "vulnerability_id": "VCID-eg2n-7z1u-tkfw", "summary": "kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47400.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47400.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-47400", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03183", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.0324", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03302", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03215", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03194", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03167", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03177", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03298", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.0329", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03288", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03328", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03279", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.0325", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03257", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03263", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03284", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03242", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-47400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47400" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282336", "reference_id": "2282336", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282336" }, { "reference_url": "https://git.kernel.org/stable/c/3dac38bdce7932901b9f0b71c62331852c809e61", "reference_id": "3dac38bdce7932901b9f0b71c62331852c809e61", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T18:26:38Z/" } ], "url": "https://git.kernel.org/stable/c/3dac38bdce7932901b9f0b71c62331852c809e61" }, { "reference_url": "https://git.kernel.org/stable/c/5a31d4e73ada8022427b69b10fd1f01a6a8d4b3d", "reference_id": "5a31d4e73ada8022427b69b10fd1f01a6a8d4b3d", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T18:26:38Z/" } ], "url": "https://git.kernel.org/stable/c/5a31d4e73ada8022427b69b10fd1f01a6a8d4b3d" }, { "reference_url": "https://git.kernel.org/stable/c/5b09e88e1bf7fe86540fab4b5f3eece8abead39e", "reference_id": "5b09e88e1bf7fe86540fab4b5f3eece8abead39e", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T18:26:38Z/" } ], "url": "https://git.kernel.org/stable/c/5b09e88e1bf7fe86540fab4b5f3eece8abead39e" }, { "reference_url": "https://git.kernel.org/stable/c/f8ba689cb69523144d10606096ef686002dd7285", "reference_id": "f8ba689cb69523144d10606096ef686002dd7285", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T18:26:38Z/" } ], "url": "https://git.kernel.org/stable/c/f8ba689cb69523144d10606096ef686002dd7285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4106", "reference_id": "RHSA-2024:4106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4108", "reference_id": "RHSA-2024:4108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4349", "reference_id": "RHSA-2024:4349", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4349" } ], "fixed_packages": [], "aliases": [ "CVE-2021-47400" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eg2n-7z1u-tkfw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67378?format=api", "vulnerability_id": "VCID-qhpj-sbnc-t3af", "summary": "kernel: x86/platform/uv: Use alternate source for socket to node data", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53496.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53496.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53496", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04764", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04779", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04812", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04825", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0479", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0477", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04875", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04912", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04951", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04723", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04731", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05517", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05471", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53496" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400813", "reference_id": "2400813", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400813" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138", "reference_id": "RHSA-2024:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4108", "reference_id": "RHSA-2024:4108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4108" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53496" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qhpj-sbnc-t3af" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76426?format=api", "vulnerability_id": "VCID-urnh-q2jd-27dj", "summary": "kernel: netfilter: nf_tables: use timestamp to check for set element timeout", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27397.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27397.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27397", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11391", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11535", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11508", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11366", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11365", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11488", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11441", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.114", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11326", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11257", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11569", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11624", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11414", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.115", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11559", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27397" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27397", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27397" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/0d40e8cb1d1f56a994cdd2e015af622fdca9ed4d", "reference_id": "0d40e8cb1d1f56a994cdd2e015af622fdca9ed4d", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:42Z/" } ], "url": "https://git.kernel.org/stable/c/0d40e8cb1d1f56a994cdd2e015af622fdca9ed4d" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280434", "reference_id": "2280434", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280434" }, { "reference_url": "https://git.kernel.org/stable/c/383182db8d58c4237772ba0764cded4938a235c3", "reference_id": "383182db8d58c4237772ba0764cded4938a235c3", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:42Z/" } ], "url": "https://git.kernel.org/stable/c/383182db8d58c4237772ba0764cded4938a235c3" }, { "reference_url": "https://git.kernel.org/stable/c/7395dfacfff65e9938ac0889dafa1ab01e987d15", "reference_id": "7395dfacfff65e9938ac0889dafa1ab01e987d15", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:42Z/" } ], "url": "https://git.kernel.org/stable/c/7395dfacfff65e9938ac0889dafa1ab01e987d15" }, { "reference_url": "https://git.kernel.org/stable/c/7b17de2a71e56c10335b565cc7ad238e6d984379", "reference_id": "7b17de2a71e56c10335b565cc7ad238e6d984379", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:42Z/" } ], "url": "https://git.kernel.org/stable/c/7b17de2a71e56c10335b565cc7ad238e6d984379" }, { "reference_url": "https://git.kernel.org/stable/c/7fa2e2960fff8322ce2ded57b5f8e9cbc450b967", "reference_id": "7fa2e2960fff8322ce2ded57b5f8e9cbc450b967", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:42Z/" } ], "url": "https://git.kernel.org/stable/c/7fa2e2960fff8322ce2ded57b5f8e9cbc450b967" }, { "reference_url": "https://git.kernel.org/stable/c/b45176b869673417ace338b87cf9cdb66e2eeb01", "reference_id": "b45176b869673417ace338b87cf9cdb66e2eeb01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:42Z/" } ], "url": "https://git.kernel.org/stable/c/b45176b869673417ace338b87cf9cdb66e2eeb01" }, { "reference_url": "https://git.kernel.org/stable/c/eaf1a29ea5d7dba8e84e9e9f3b3f47d0cd540bfe", "reference_id": "eaf1a29ea5d7dba8e84e9e9f3b3f47d0cd540bfe", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:42Z/" } ], "url": "https://git.kernel.org/stable/c/eaf1a29ea5d7dba8e84e9e9f3b3f47d0cd540bfe" }, { "reference_url": "https://git.kernel.org/stable/c/f8dfda798650241c1692058713ca4fef8e429061", "reference_id": "f8dfda798650241c1692058713ca4fef8e429061", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:42Z/" } ], "url": "https://git.kernel.org/stable/c/f8dfda798650241c1692058713ca4fef8e429061" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4106", "reference_id": "RHSA-2024:4106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4108", "reference_id": "RHSA-2024:4108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4211", "reference_id": "RHSA-2024:4211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4352", "reference_id": "RHSA-2024:4352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4447", "reference_id": "RHSA-2024:4447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4583", "reference_id": "RHSA-2024:4583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4740", "reference_id": "RHSA-2024:4740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5256", "reference_id": "RHSA-2024:5256", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5256" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5257", "reference_id": "RHSA-2024:5257", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5257" }, { "reference_url": "https://usn.ubuntu.com/7072-1/", "reference_id": "USN-7072-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7072-1/" }, { "reference_url": "https://usn.ubuntu.com/7072-2/", "reference_id": "USN-7072-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7072-2/" }, { "reference_url": "https://usn.ubuntu.com/7073-1/", "reference_id": "USN-7073-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7073-1/" }, { "reference_url": "https://usn.ubuntu.com/7073-2/", "reference_id": "USN-7073-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7073-2/" }, { "reference_url": "https://usn.ubuntu.com/7076-1/", "reference_id": "USN-7076-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7076-1/" }, { "reference_url": "https://usn.ubuntu.com/7076-2/", "reference_id": "USN-7076-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7076-2/" }, { "reference_url": "https://usn.ubuntu.com/7119-1/", "reference_id": "USN-7119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7119-1/" }, { "reference_url": "https://usn.ubuntu.com/7121-1/", "reference_id": "USN-7121-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7121-1/" }, { "reference_url": "https://usn.ubuntu.com/7121-2/", "reference_id": "USN-7121-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7121-2/" }, { "reference_url": "https://usn.ubuntu.com/7121-3/", "reference_id": "USN-7121-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7121-3/" }, { "reference_url": "https://usn.ubuntu.com/7148-1/", "reference_id": "USN-7148-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7148-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-27397" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-urnh-q2jd-27dj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76163?format=api", "vulnerability_id": "VCID-w75k-uv9m-kuhm", "summary": "kernel: smb: client: fix UAF in smb2_reconnect_server()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35870.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35870.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-35870", "reference_id": "", "reference_type": "", "scores": [ { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00786", "published_at": "2026-05-05T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.0075", "published_at": "2026-04-08T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00738", "published_at": "2026-04-11T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00733", "published_at": "2026-04-16T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00734", "published_at": "2026-04-13T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00737", "published_at": "2026-04-18T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.0078", "published_at": "2026-04-29T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00782", "published_at": "2026-04-24T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00783", "published_at": "2026-05-07T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00751", "published_at": "2026-04-07T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00749", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-35870" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35870", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35870" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281740", "reference_id": "2281740", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281740" }, { "reference_url": "https://git.kernel.org/stable/c/24a9799aa8efecd0eb55a75e35f9d8e6400063aa", "reference_id": "24a9799aa8efecd0eb55a75e35f9d8e6400063aa", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:38:54Z/" } ], "url": "https://git.kernel.org/stable/c/24a9799aa8efecd0eb55a75e35f9d8e6400063aa" }, { "reference_url": "https://git.kernel.org/stable/c/45f2beda1f1bc3d962ec07db1ccc3197c25499a5", "reference_id": "45f2beda1f1bc3d962ec07db1ccc3197c25499a5", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:38:54Z/" } ], "url": "https://git.kernel.org/stable/c/45f2beda1f1bc3d962ec07db1ccc3197c25499a5" }, { "reference_url": "https://git.kernel.org/stable/c/6202996a1c1887e83d0b3b0fcd86d0e5e6910ea0", "reference_id": "6202996a1c1887e83d0b3b0fcd86d0e5e6910ea0", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:38:54Z/" } ], "url": "https://git.kernel.org/stable/c/6202996a1c1887e83d0b3b0fcd86d0e5e6910ea0" }, { "reference_url": "https://git.kernel.org/stable/c/755fe68cd4b59e1d2a2dd3286177fd4404f57fed", "reference_id": "755fe68cd4b59e1d2a2dd3286177fd4404f57fed", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:38:54Z/" } ], "url": "https://git.kernel.org/stable/c/755fe68cd4b59e1d2a2dd3286177fd4404f57fed" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4106", "reference_id": "RHSA-2024:4106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4108", "reference_id": "RHSA-2024:4108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4349", "reference_id": "RHSA-2024:4349", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4349" }, { "reference_url": "https://usn.ubuntu.com/6893-1/", "reference_id": "USN-6893-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6893-1/" }, { "reference_url": "https://usn.ubuntu.com/6893-2/", "reference_id": "USN-6893-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6893-2/" }, { "reference_url": "https://usn.ubuntu.com/6893-3/", "reference_id": "USN-6893-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6893-3/" }, { "reference_url": "https://usn.ubuntu.com/6918-1/", "reference_id": "USN-6918-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6918-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-35870" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w75k-uv9m-kuhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75488?format=api", "vulnerability_id": "VCID-zx1z-mhtk-x7cn", "summary": "kernel: octeontx2-af: avoid off-by-one read from userspace", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36957.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36957.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36957", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08584", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.085", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08391", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08375", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08536", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08498", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08492", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08437", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08473", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08529", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08448", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08521", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08541", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08535", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08515", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36957" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52882", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52882" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27401", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27401" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35848", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35848" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35947", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35947" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36883", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36883" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36889", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36904", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36904" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36905" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36941", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36941" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36954", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36954" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36957", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36957" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36959" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/0a0285cee11c7dcc2657bcd456e469958a5009e7", "reference_id": "0a0285cee11c7dcc2657bcd456e469958a5009e7", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-05T18:14:35Z/" } ], "url": "https://git.kernel.org/stable/c/0a0285cee11c7dcc2657bcd456e469958a5009e7" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284581", "reference_id": "2284581", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284581" }, { "reference_url": "https://git.kernel.org/stable/c/8f11fe3ea3fc261640cfc8a5addd838000407c67", "reference_id": "8f11fe3ea3fc261640cfc8a5addd838000407c67", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-05T18:14:35Z/" } ], "url": "https://git.kernel.org/stable/c/8f11fe3ea3fc261640cfc8a5addd838000407c67" }, { "reference_url": "https://git.kernel.org/stable/c/bcdac70adceb44373da204c3c297f2a98e13216e", "reference_id": "bcdac70adceb44373da204c3c297f2a98e13216e", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-05T18:14:35Z/" } ], "url": "https://git.kernel.org/stable/c/bcdac70adceb44373da204c3c297f2a98e13216e" }, { "reference_url": "https://git.kernel.org/stable/c/ec697fbd38cbe2eef0948b58673b146caa95402f", "reference_id": "ec697fbd38cbe2eef0948b58673b146caa95402f", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-05T18:14:35Z/" } ], "url": "https://git.kernel.org/stable/c/ec697fbd38cbe2eef0948b58673b146caa95402f" }, { "reference_url": "https://git.kernel.org/stable/c/f299ee709fb45036454ca11e90cb2810fe771878", "reference_id": "f299ee709fb45036454ca11e90cb2810fe771878", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-05T18:14:35Z/" } ], "url": "https://git.kernel.org/stable/c/f299ee709fb45036454ca11e90cb2810fe771878" }, { "reference_url": "https://git.kernel.org/stable/c/fc3e0076c1f82fe981d321e3a7bad4cbee542c19", "reference_id": "fc3e0076c1f82fe981d321e3a7bad4cbee542c19", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-05T18:14:35Z/" } ], "url": "https://git.kernel.org/stable/c/fc3e0076c1f82fe981d321e3a7bad4cbee542c19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4106", "reference_id": "RHSA-2024:4106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4108", "reference_id": "RHSA-2024:4108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4583", "reference_id": "RHSA-2024:4583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4583" }, { "reference_url": "https://usn.ubuntu.com/6949-1/", "reference_id": "USN-6949-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6949-1/" }, { "reference_url": "https://usn.ubuntu.com/6949-2/", "reference_id": "USN-6949-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6949-2/" }, { "reference_url": "https://usn.ubuntu.com/6950-1/", "reference_id": "USN-6950-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6950-1/" }, { "reference_url": "https://usn.ubuntu.com/6950-2/", "reference_id": "USN-6950-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6950-2/" }, { "reference_url": "https://usn.ubuntu.com/6950-3/", "reference_id": "USN-6950-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6950-3/" }, { "reference_url": "https://usn.ubuntu.com/6950-4/", "reference_id": "USN-6950-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6950-4/" }, { "reference_url": "https://usn.ubuntu.com/6952-1/", "reference_id": "USN-6952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6952-1/" }, { "reference_url": "https://usn.ubuntu.com/6952-2/", "reference_id": "USN-6952-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6952-2/" }, { "reference_url": "https://usn.ubuntu.com/6955-1/", "reference_id": "USN-6955-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6955-1/" }, { "reference_url": "https://usn.ubuntu.com/6956-1/", "reference_id": "USN-6956-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6956-1/" }, { "reference_url": "https://usn.ubuntu.com/6957-1/", "reference_id": "USN-6957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6957-1/" }, { "reference_url": "https://usn.ubuntu.com/7019-1/", "reference_id": "USN-7019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7019-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-36957" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zx1z-mhtk-x7cn" } ], "fixing_vulnerabilities": [], "risk_score": "3.6", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-284.71.1%3Farch=el9_2" }