Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/94044?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/94044?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-372.107.1?arch=el8_6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "4.18.0-372.107.1", "qualifiers": { "arch": "el8_6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77396?format=api", "vulnerability_id": "VCID-5ynw-da7q-d7fq", "summary": "kernel: wifi: mac80211: fix potential key use-after-free", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52530.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52530.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52530", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02286", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02371", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02266", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02273", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02367", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02346", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02339", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02387", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02361", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02292", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02289", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02314", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02297", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02284", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02282", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52530" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267787", "reference_id": "2267787", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267787" }, { "reference_url": "https://git.kernel.org/stable/c/2408f491ff998d674707725eadc47d8930aced09", "reference_id": "2408f491ff998d674707725eadc47d8930aced09", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-21T16:13:28Z/" } ], "url": "https://git.kernel.org/stable/c/2408f491ff998d674707725eadc47d8930aced09" }, { "reference_url": "https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36", "reference_id": "2f4e16e39e4f5e78248dd9e51276a83203950b36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-21T16:13:28Z/" } ], "url": "https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36" }, { "reference_url": "https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b", "reference_id": "31db78a4923ef5e2008f2eed321811ca79e7f71b", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-21T16:13:28Z/" } ], "url": "https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b" }, { "reference_url": "https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d", "reference_id": "65c72a7201704574dace708cbc96a8f367b1491d", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-21T16:13:28Z/" } ], "url": "https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d" }, { "reference_url": "https://git.kernel.org/stable/c/e8a834eb09bb95c2bf9c76f1a28ecef7d8c439d0", "reference_id": "e8a834eb09bb95c2bf9c76f1a28ecef7d8c439d0", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-21T16:13:28Z/" } ], "url": "https://git.kernel.org/stable/c/e8a834eb09bb95c2bf9c76f1a28ecef7d8c439d0" }, { "reference_url": "https://git.kernel.org/stable/c/e8e599a635066c50ac214c3e10858f1d37e03022", "reference_id": "e8e599a635066c50ac214c3e10858f1d37e03022", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-21T16:13:28Z/" } ], "url": "https://git.kernel.org/stable/c/e8e599a635066c50ac214c3e10858f1d37e03022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3859", "reference_id": "RHSA-2024:3859", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3859" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4740", "reference_id": "RHSA-2024:4740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5101", "reference_id": "RHSA-2024:5101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5102", "reference_id": "RHSA-2024:5102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5102" }, { "reference_url": "https://usn.ubuntu.com/6775-1/", "reference_id": "USN-6775-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6775-1/" }, { "reference_url": "https://usn.ubuntu.com/6775-2/", "reference_id": "USN-6775-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6775-2/" }, { "reference_url": "https://usn.ubuntu.com/6776-1/", "reference_id": "USN-6776-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6776-1/" }, { "reference_url": "https://usn.ubuntu.com/6777-1/", "reference_id": "USN-6777-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6777-1/" }, { "reference_url": "https://usn.ubuntu.com/6777-2/", "reference_id": "USN-6777-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6777-2/" }, { "reference_url": "https://usn.ubuntu.com/6777-3/", "reference_id": "USN-6777-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6777-3/" }, { "reference_url": "https://usn.ubuntu.com/6777-4/", "reference_id": "USN-6777-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6777-4/" }, { "reference_url": "https://usn.ubuntu.com/6778-1/", "reference_id": "USN-6778-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6778-1/" }, { "reference_url": "https://usn.ubuntu.com/6795-1/", "reference_id": "USN-6795-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6795-1/" }, { "reference_url": "https://usn.ubuntu.com/6828-1/", "reference_id": "USN-6828-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6828-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-52530" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ynw-da7q-d7fq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78214?format=api", "vulnerability_id": "VCID-cf2b-yvwj-wyh1", "summary": "kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4155.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4155.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4155", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01885", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01869", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01864", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01846", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01845", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01931", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02119", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02073", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.0207", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02098", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02092", "published_at": "2026-04-26T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00715", "published_at": "2026-04-07T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00705", "published_at": "2026-04-09T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00713", "published_at": "2026-04-02T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.0071", "published_at": "2026-04-04T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00714", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4155" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213802", "reference_id": "2213802", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:49:34Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213802" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-4155", "reference_id": "CVE-2023-4155", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:49:34Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-4155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901", "reference_id": "RHSA-2023:6901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3859", "reference_id": "RHSA-2024:3859", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3859" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4740", "reference_id": "RHSA-2024:4740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4740" }, { "reference_url": "https://usn.ubuntu.com/6343-1/", "reference_id": "USN-6343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6343-1/" }, { "reference_url": "https://usn.ubuntu.com/6412-1/", "reference_id": "USN-6412-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6412-1/" }, { "reference_url": "https://usn.ubuntu.com/6416-1/", "reference_id": "USN-6416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6416-1/" }, { "reference_url": "https://usn.ubuntu.com/6416-2/", "reference_id": "USN-6416-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6416-2/" }, { "reference_url": "https://usn.ubuntu.com/6416-3/", "reference_id": "USN-6416-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6416-3/" }, { "reference_url": "https://usn.ubuntu.com/6445-1/", "reference_id": "USN-6445-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6445-1/" }, { "reference_url": "https://usn.ubuntu.com/6445-2/", "reference_id": "USN-6445-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6445-2/" }, { "reference_url": "https://usn.ubuntu.com/6466-1/", "reference_id": "USN-6466-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6466-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-4155" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cf2b-yvwj-wyh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77879?format=api", "vulnerability_id": "VCID-n1w6-27yz-dfer", "summary": "kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51779.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51779.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-51779", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28149", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28105", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28192", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27988", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28056", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28098", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28062", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28004", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31408", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31914", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31893", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31866", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.3222", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32015", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.31874", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32099", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-51779" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256822", "reference_id": "2256822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256822" }, { "reference_url": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768", "reference_id": "2e07e8348ea454615e268222ae3fc240421be768", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-05T17:06:18Z/" } ], "url": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "reference_id": "msg00016.html", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-05T17:06:18Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10941", "reference_id": "RHSA-2024:10941", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10941" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2950", "reference_id": "RHSA-2024:2950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138", "reference_id": "RHSA-2024:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3854", "reference_id": "RHSA-2024:3854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3855", "reference_id": "RHSA-2024:3855", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3859", "reference_id": "RHSA-2024:3859", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3859" }, { "reference_url": "https://usn.ubuntu.com/6606-1/", "reference_id": "USN-6606-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6606-1/" }, { "reference_url": "https://usn.ubuntu.com/6680-1/", "reference_id": "USN-6680-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6680-1/" }, { "reference_url": "https://usn.ubuntu.com/6680-2/", "reference_id": "USN-6680-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6680-2/" }, { "reference_url": "https://usn.ubuntu.com/6680-3/", "reference_id": "USN-6680-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6680-3/" }, { "reference_url": "https://usn.ubuntu.com/6681-1/", "reference_id": "USN-6681-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6681-1/" }, { "reference_url": "https://usn.ubuntu.com/6681-2/", "reference_id": "USN-6681-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6681-2/" }, { "reference_url": "https://usn.ubuntu.com/6681-3/", "reference_id": "USN-6681-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6681-3/" }, { "reference_url": "https://usn.ubuntu.com/6681-4/", "reference_id": "USN-6681-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6681-4/" }, { "reference_url": "https://usn.ubuntu.com/6686-1/", "reference_id": "USN-6686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6686-1/" }, { "reference_url": "https://usn.ubuntu.com/6686-2/", "reference_id": "USN-6686-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6686-2/" }, { "reference_url": "https://usn.ubuntu.com/6686-3/", "reference_id": "USN-6686-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6686-3/" }, { "reference_url": "https://usn.ubuntu.com/6686-4/", "reference_id": "USN-6686-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6686-4/" }, { "reference_url": "https://usn.ubuntu.com/6686-5/", "reference_id": "USN-6686-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6686-5/" }, { "reference_url": "https://usn.ubuntu.com/6705-1/", "reference_id": "USN-6705-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6705-1/" }, { "reference_url": "https://usn.ubuntu.com/6716-1/", "reference_id": "USN-6716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6716-1/" }, { "reference_url": "https://usn.ubuntu.com/6739-1/", "reference_id": "USN-6739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6739-1/" }, { "reference_url": "https://usn.ubuntu.com/6740-1/", "reference_id": "USN-6740-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6740-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-51779" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n1w6-27yz-dfer" } ], "fixing_vulnerabilities": [], "risk_score": "3.1", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.107.1%3Farch=el8_6" }