{"url":"http://public2.vulnerablecode.io/api/packages/94247?format=json","purl":"pkg:rpm/redhat/kernel@5.14.0-284.55.1?arch=el9_2","type":"rpm","namespace":"redhat","name":"kernel","version":"5.14.0-284.55.1","qualifiers":{"arch":"el9_2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78123?format=json","vulnerability_id":"VCID-1p3k-f3ck-83bg","summary":"kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4244.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4244","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04356","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04367","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04417","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04411","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04396","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0438","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04347","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04487","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04513","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04534","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04578","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04608","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235306","reference_id":"2235306","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1018","reference_id":"RHSA-2024:1018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1019","reference_id":"RHSA-2024:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1248","reference_id":"RHSA-2024:1248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2094","reference_id":"RHSA-2024:2094","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2094"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2950","reference_id":"RHSA-2024:2950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3138","reference_id":"RHSA-2024:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3414","reference_id":"RHSA-2024:3414","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3414"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3421","reference_id":"RHSA-2024:3421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3421"},{"reference_url":"https://usn.ubuntu.com/6444-1/","reference_id":"USN-6444-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6444-1/"},{"reference_url":"https://usn.ubuntu.com/6444-2/","reference_id":"USN-6444-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6444-2/"},{"reference_url":"https://usn.ubuntu.com/6445-1/","reference_id":"USN-6445-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-1/"},{"reference_url":"https://usn.ubuntu.com/6445-2/","reference_id":"USN-6445-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-2/"},{"reference_url":"https://usn.ubuntu.com/6446-1/","reference_id":"USN-6446-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6446-1/"},{"reference_url":"https://usn.ubuntu.com/6446-2/","reference_id":"USN-6446-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6446-2/"},{"reference_url":"https://usn.ubuntu.com/6446-3/","reference_id":"USN-6446-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6446-3/"},{"reference_url":"https://usn.ubuntu.com/6461-1/","reference_id":"USN-6461-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6461-1/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"},{"reference_url":"https://usn.ubuntu.com/6503-1/","reference_id":"USN-6503-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6503-1/"},{"reference_url":"https://usn.ubuntu.com/6537-1/","reference_id":"USN-6537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6537-1/"},{"reference_url":"https://usn.ubuntu.com/6572-1/","reference_id":"USN-6572-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6572-1/"},{"reference_url":"https://usn.ubuntu.com/6681-1/","reference_id":"USN-6681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6681-1/"},{"reference_url":"https://usn.ubuntu.com/6681-2/","reference_id":"USN-6681-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6681-2/"},{"reference_url":"https://usn.ubuntu.com/6681-3/","reference_id":"USN-6681-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6681-3/"},{"reference_url":"https://usn.ubuntu.com/6681-4/","reference_id":"USN-6681-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6681-4/"},{"reference_url":"https://usn.ubuntu.com/6716-1/","reference_id":"USN-6716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6716-1/"}],"fixed_packages":[],"aliases":["CVE-2023-4244"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1p3k-f3ck-83bg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79037?format=json","vulnerability_id":"VCID-5yqp-43hw-cuhu","summary":"kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38096.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38096.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38096","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10463","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10537","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10604","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.106","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10576","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10445","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10427","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10871","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10892","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10793","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10737","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10977","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11039","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10937","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10851","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133452","reference_id":"2133452","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133452"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T13:45:25Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1018","reference_id":"RHSA-2024:1018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1019","reference_id":"RHSA-2024:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1367","reference_id":"RHSA-2024:1367","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1367"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1382","reference_id":"RHSA-2024:1382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1607","reference_id":"RHSA-2024:1607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1614","reference_id":"RHSA-2024:1614","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2093","reference_id":"RHSA-2024:2093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://bugzilla.openanolis.cn/show_bug.cgi?id=2073","reference_id":"show_bug.cgi?id=2073","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T13:45:25Z/"}],"url":"https://bugzilla.openanolis.cn/show_bug.cgi?id=2073"},{"reference_url":"https://usn.ubuntu.com/6816-1/","reference_id":"USN-6816-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6816-1/"},{"reference_url":"https://usn.ubuntu.com/6817-1/","reference_id":"USN-6817-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6817-1/"},{"reference_url":"https://usn.ubuntu.com/6817-2/","reference_id":"USN-6817-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6817-2/"},{"reference_url":"https://usn.ubuntu.com/6817-3/","reference_id":"USN-6817-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6817-3/"},{"reference_url":"https://usn.ubuntu.com/6878-1/","reference_id":"USN-6878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6878-1/"},{"reference_url":"https://usn.ubuntu.com/6898-1/","reference_id":"USN-6898-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6898-1/"},{"reference_url":"https://usn.ubuntu.com/6898-2/","reference_id":"USN-6898-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6898-2/"},{"reference_url":"https://usn.ubuntu.com/6898-3/","reference_id":"USN-6898-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6898-3/"},{"reference_url":"https://usn.ubuntu.com/6898-4/","reference_id":"USN-6898-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6898-4/"},{"reference_url":"https://usn.ubuntu.com/6917-1/","reference_id":"USN-6917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6917-1/"},{"reference_url":"https://usn.ubuntu.com/6919-1/","reference_id":"USN-6919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6919-1/"},{"reference_url":"https://usn.ubuntu.com/6927-1/","reference_id":"USN-6927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6927-1/"},{"reference_url":"https://usn.ubuntu.com/7019-1/","reference_id":"USN-7019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7019-1/"},{"reference_url":"https://usn.ubuntu.com/7173-1/","reference_id":"USN-7173-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7173-1/"},{"reference_url":"https://usn.ubuntu.com/7173-2/","reference_id":"USN-7173-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7173-2/"},{"reference_url":"https://usn.ubuntu.com/7173-3/","reference_id":"USN-7173-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7173-3/"},{"reference_url":"https://usn.ubuntu.com/7195-1/","reference_id":"USN-7195-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7195-1/"},{"reference_url":"https://usn.ubuntu.com/7195-2/","reference_id":"USN-7195-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7195-2/"},{"reference_url":"https://usn.ubuntu.com/7413-1/","reference_id":"USN-7413-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7413-1/"}],"fixed_packages":[],"aliases":["CVE-2022-38096"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5yqp-43hw-cuhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77789?format=json","vulnerability_id":"VCID-5zmf-5v9v-k3h1","summary":"kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51042.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51042.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-51042","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0907","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09151","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09153","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0912","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09105","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09001","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0898","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09136","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09179","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09123","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10096","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10153","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11062","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-51042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259866","reference_id":"2259866","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259866"},{"reference_url":"https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628","reference_id":"2e54154b9f27262efd0cb4f903cc7d5ad1fe9628","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:10Z/"}],"url":"https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12","reference_id":"ChangeLog-6.4.12","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:10Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1018","reference_id":"RHSA-2024:1018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1019","reference_id":"RHSA-2024:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1248","reference_id":"RHSA-2024:1248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1607","reference_id":"RHSA-2024:1607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1614","reference_id":"RHSA-2024:1614","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2093","reference_id":"RHSA-2024:2093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2094","reference_id":"RHSA-2024:2094","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2094"}],"fixed_packages":[],"aliases":["CVE-2023-51042"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5zmf-5v9v-k3h1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77884?format=json","vulnerability_id":"VCID-cavt-1v84-uqgt","summary":"kernel: GSM multiplexing race condition leads to privilege escalation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6546","reference_id":"","reference_type":"","scores":[{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55796","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55818","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55798","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55849","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55852","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55861","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55841","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55822","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55859","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55862","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55751","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55704","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56524","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56543","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56525","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56589","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255498","reference_id":"2255498","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0937","reference_id":"RHSA-2024:0937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1018","reference_id":"RHSA-2024:1018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1019","reference_id":"RHSA-2024:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1055","reference_id":"RHSA-2024:1055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1253","reference_id":"RHSA-2024:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1607","reference_id":"RHSA-2024:1607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1612","reference_id":"RHSA-2024:1612","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1612"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1614","reference_id":"RHSA-2024:1614","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2093","reference_id":"RHSA-2024:2093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2621","reference_id":"RHSA-2024:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2697","reference_id":"RHSA-2024:2697","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4577","reference_id":"RHSA-2024:4577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4729","reference_id":"RHSA-2024:4729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4731","reference_id":"RHSA-2024:4731","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4731"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4970","reference_id":"RHSA-2024:4970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4970"}],"fixed_packages":[],"aliases":["CVE-2023-6546"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cavt-1v84-uqgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77792?format=json","vulnerability_id":"VCID-g6yc-cmf7-kbhf","summary":"kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51043.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51043.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-51043","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02372","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0248","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02458","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02446","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02434","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02493","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02464","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02383","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0238","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02385","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02405","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02382","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0237","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02369","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02354","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02359","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-51043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51043"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2260005","reference_id":"2260005","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2260005"},{"reference_url":"https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255","reference_id":"4e076c73e4f6e90816b30fcd4a0d7ab365087255","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-29T13:47:31Z/"}],"url":"https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5","reference_id":"ChangeLog-6.4.5","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-29T13:47:31Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1018","reference_id":"RHSA-2024:1018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1019","reference_id":"RHSA-2024:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://usn.ubuntu.com/6739-1/","reference_id":"USN-6739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6739-1/"},{"reference_url":"https://usn.ubuntu.com/6740-1/","reference_id":"USN-6740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6740-1/"}],"fixed_packages":[],"aliases":["CVE-2023-51043"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g6yc-cmf7-kbhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77876?format=json","vulnerability_id":"VCID-pp43-v99a-k3cz","summary":"kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0193.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0193.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0193","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25212","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25398","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25388","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25358","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25313","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25267","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25148","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2996","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29913","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29857","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29955","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29995","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.30043","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0193"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255653","reference_id":"2255653","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255653"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:9::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:9::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9","reference_id":"cpe:/a:redhat:logging:5.8::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::nfv","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::realtime","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.2::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv","reference_id":"cpe:/a:redhat:rhel_eus:9.2::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime","reference_id":"cpe:/a:redhat:rhel_eus:9.2::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:9.0::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-0193","reference_id":"CVE-2024-0193","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-0193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1018","reference_id":"RHSA-2024:1018","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:1018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1019","reference_id":"RHSA-2024:1019","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1248","reference_id":"RHSA-2024:1248","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:1248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2094","reference_id":"RHSA-2024:2094","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2094"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4412","reference_id":"RHSA-2024:4412","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4415","reference_id":"RHSA-2024:4415","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-02T13:17:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4415"},{"reference_url":"https://usn.ubuntu.com/6606-1/","reference_id":"USN-6606-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6606-1/"},{"reference_url":"https://usn.ubuntu.com/6607-1/","reference_id":"USN-6607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6607-1/"},{"reference_url":"https://usn.ubuntu.com/6608-1/","reference_id":"USN-6608-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6608-1/"},{"reference_url":"https://usn.ubuntu.com/6608-2/","reference_id":"USN-6608-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6608-2/"},{"reference_url":"https://usn.ubuntu.com/6609-1/","reference_id":"USN-6609-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6609-1/"},{"reference_url":"https://usn.ubuntu.com/6609-2/","reference_id":"USN-6609-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6609-2/"},{"reference_url":"https://usn.ubuntu.com/6609-3/","reference_id":"USN-6609-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6609-3/"},{"reference_url":"https://usn.ubuntu.com/6628-1/","reference_id":"USN-6628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6628-1/"},{"reference_url":"https://usn.ubuntu.com/6628-2/","reference_id":"USN-6628-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6628-2/"},{"reference_url":"https://usn.ubuntu.com/6635-1/","reference_id":"USN-6635-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6635-1/"}],"fixed_packages":[],"aliases":["CVE-2024-0193"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pp43-v99a-k3cz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77772?format=json","vulnerability_id":"VCID-qkq7-ws9x-43f7","summary":"kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1086.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1086.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1086","reference_id":"","reference_type":"","scores":[{"value":"0.85106","scoring_system":"epss","scoring_elements":"0.9936","published_at":"2026-05-07T12:55:00Z"},{"value":"0.85264","scoring_system":"epss","scoring_elements":"0.99365","published_at":"2026-05-05T12:55:00Z"},{"value":"0.85405","scoring_system":"epss","scoring_elements":"0.99366","published_at":"2026-04-11T12:55:00Z"},{"value":"0.85405","scoring_system":"epss","scoring_elements":"0.99364","published_at":"2026-04-07T12:55:00Z"},{"value":"0.85405","scoring_system":"epss","scoring_elements":"0.99365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.85405","scoring_system":"epss","scoring_elements":"0.99367","published_at":"2026-04-13T12:55:00Z"},{"value":"0.85405","scoring_system":"epss","scoring_elements":"0.99369","published_at":"2026-04-18T12:55:00Z"},{"value":"0.85911","scoring_system":"epss","scoring_elements":"0.99383","published_at":"2026-04-04T12:55:00Z"},{"value":"0.86034","scoring_system":"epss","scoring_elements":"0.99397","published_at":"2026-04-26T12:55:00Z"},{"value":"0.86056","scoring_system":"epss","scoring_elements":"0.99389","published_at":"2026-04-02T12:55:00Z"},{"value":"0.86056","scoring_system":"epss","scoring_elements":"0.99399","published_at":"2026-04-29T12:55:00Z"},{"value":"0.86753","scoring_system":"epss","scoring_elements":"0.99429","published_at":"2026-04-24T12:55:00Z"},{"value":"0.86753","scoring_system":"epss","scoring_elements":"0.99427","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/14/1","reference_id":"1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/14/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/15/2","reference_id":"2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/15/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/10/22","reference_id":"22","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/10/22"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262126","reference_id":"2262126","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262126"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/10/23","reference_id":"23","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/10/23"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/17/5","reference_id":"5","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/17/5"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/","reference_id":"7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/"},{"reference_url":"https://github.com/Notselwyn/CVE-2024-1086","reference_id":"CVE-2024-1086","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/"}],"url":"https://github.com/Notselwyn/CVE-2024-1086"},{"reference_url":"https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660","reference_id":"f342de4e2f33e0e39165d8639387aa6c19dff660","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/"}],"url":"https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660","reference_id":"?id=f342de4e2f33e0e39165d8639387aa6c19dff660","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660"},{"reference_url":"https://news.ycombinator.com/item?id=39828424","reference_id":"item?id=39828424","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/"}],"url":"https://news.ycombinator.com/item?id=39828424"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html","reference_id":"msg00016.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"reference_url":"https://pwning.tech/nftables/","reference_id":"nftables","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/"}],"url":"https://pwning.tech/nftables/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240614-0009/","reference_id":"ntap-20240614-0009","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240614-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1018","reference_id":"RHSA-2024:1018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1019","reference_id":"RHSA-2024:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1249","reference_id":"RHSA-2024:1249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1332","reference_id":"RHSA-2024:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1607","reference_id":"RHSA-2024:1607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1614","reference_id":"RHSA-2024:1614","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2093","reference_id":"RHSA-2024:2093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2697","reference_id":"RHSA-2024:2697","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3318","reference_id":"RHSA-2024:3318","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3318"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3319","reference_id":"RHSA-2024:3319","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3319"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3414","reference_id":"RHSA-2024:3414","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3414"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3421","reference_id":"RHSA-2024:3421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3427","reference_id":"RHSA-2024:3427","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3528","reference_id":"RHSA-2024:3528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3528"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3529","reference_id":"RHSA-2024:3529","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3529"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3530","reference_id":"RHSA-2024:3530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3805","reference_id":"RHSA-2024:3805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4073","reference_id":"RHSA-2024:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4074","reference_id":"RHSA-2024:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4075","reference_id":"RHSA-2024:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4075"},{"reference_url":"https://usn.ubuntu.com/6688-1/","reference_id":"USN-6688-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6688-1/"},{"reference_url":"https://usn.ubuntu.com/6700-1/","reference_id":"USN-6700-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6700-1/"},{"reference_url":"https://usn.ubuntu.com/6700-2/","reference_id":"USN-6700-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6700-2/"},{"reference_url":"https://usn.ubuntu.com/6701-1/","reference_id":"USN-6701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-1/"},{"reference_url":"https://usn.ubuntu.com/6701-2/","reference_id":"USN-6701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-2/"},{"reference_url":"https://usn.ubuntu.com/6701-3/","reference_id":"USN-6701-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-3/"},{"reference_url":"https://usn.ubuntu.com/6701-4/","reference_id":"USN-6701-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-4/"},{"reference_url":"https://usn.ubuntu.com/6702-1/","reference_id":"USN-6702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6702-1/"},{"reference_url":"https://usn.ubuntu.com/6702-2/","reference_id":"USN-6702-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6702-2/"},{"reference_url":"https://usn.ubuntu.com/6704-1/","reference_id":"USN-6704-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6704-1/"},{"reference_url":"https://usn.ubuntu.com/6704-2/","reference_id":"USN-6704-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6704-2/"},{"reference_url":"https://usn.ubuntu.com/6704-3/","reference_id":"USN-6704-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6704-3/"},{"reference_url":"https://usn.ubuntu.com/6704-4/","reference_id":"USN-6704-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6704-4/"},{"reference_url":"https://usn.ubuntu.com/6705-1/","reference_id":"USN-6705-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6705-1/"},{"reference_url":"https://usn.ubuntu.com/6707-1/","reference_id":"USN-6707-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6707-1/"},{"reference_url":"https://usn.ubuntu.com/6707-2/","reference_id":"USN-6707-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6707-2/"},{"reference_url":"https://usn.ubuntu.com/6707-3/","reference_id":"USN-6707-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6707-3/"},{"reference_url":"https://usn.ubuntu.com/6707-4/","reference_id":"USN-6707-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6707-4/"},{"reference_url":"https://usn.ubuntu.com/6716-1/","reference_id":"USN-6716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6716-1/"}],"fixed_packages":[],"aliases":["CVE-2024-1086"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qkq7-ws9x-43f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77773?format=json","vulnerability_id":"VCID-raem-h5nr-g7cq","summary":"kernel: nf_tables: use-after-free vulnerability in the nft_setelem_catchall_deactivate() function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1085.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1085","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14103","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14133","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14143","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14074","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13946","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14371","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14178","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14314","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14223","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14166","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14056","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1085"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262127","reference_id":"2262127","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262127"},{"reference_url":"https://kernel.dance/b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7","reference_id":"b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:46:32Z/"}],"url":"https://kernel.dance/b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7","reference_id":"?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:46:32Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1018","reference_id":"RHSA-2024:1018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1019","reference_id":"RHSA-2024:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://usn.ubuntu.com/6688-1/","reference_id":"USN-6688-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6688-1/"},{"reference_url":"https://usn.ubuntu.com/6704-1/","reference_id":"USN-6704-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6704-1/"},{"reference_url":"https://usn.ubuntu.com/6704-2/","reference_id":"USN-6704-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6704-2/"},{"reference_url":"https://usn.ubuntu.com/6704-3/","reference_id":"USN-6704-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6704-3/"},{"reference_url":"https://usn.ubuntu.com/6704-4/","reference_id":"USN-6704-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6704-4/"},{"reference_url":"https://usn.ubuntu.com/6705-1/","reference_id":"USN-6705-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6705-1/"},{"reference_url":"https://usn.ubuntu.com/6707-1/","reference_id":"USN-6707-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6707-1/"},{"reference_url":"https://usn.ubuntu.com/6707-2/","reference_id":"USN-6707-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6707-2/"},{"reference_url":"https://usn.ubuntu.com/6707-3/","reference_id":"USN-6707-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6707-3/"},{"reference_url":"https://usn.ubuntu.com/6707-4/","reference_id":"USN-6707-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6707-4/"}],"fixed_packages":[],"aliases":["CVE-2024-1085"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-raem-h5nr-g7cq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77889?format=json","vulnerability_id":"VCID-rbrm-7x37-3ugv","summary":"kernel: inactive elements in nft_pipapo_walk","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6817.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6817.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6817","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05524","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05561","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05558","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05545","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05537","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05498","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0566","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05695","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05732","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05745","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05822","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255139","reference_id":"2255139","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0881","reference_id":"RHSA-2024:0881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0897","reference_id":"RHSA-2024:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0897"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1018","reference_id":"RHSA-2024:1018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1019","reference_id":"RHSA-2024:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1248","reference_id":"RHSA-2024:1248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1367","reference_id":"RHSA-2024:1367","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1367"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1382","reference_id":"RHSA-2024:1382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2094","reference_id":"RHSA-2024:2094","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2094"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3414","reference_id":"RHSA-2024:3414","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3414"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3421","reference_id":"RHSA-2024:3421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3421"},{"reference_url":"https://usn.ubuntu.com/6606-1/","reference_id":"USN-6606-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6606-1/"},{"reference_url":"https://usn.ubuntu.com/6607-1/","reference_id":"USN-6607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6607-1/"},{"reference_url":"https://usn.ubuntu.com/6608-1/","reference_id":"USN-6608-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6608-1/"},{"reference_url":"https://usn.ubuntu.com/6608-2/","reference_id":"USN-6608-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6608-2/"},{"reference_url":"https://usn.ubuntu.com/6609-1/","reference_id":"USN-6609-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6609-1/"},{"reference_url":"https://usn.ubuntu.com/6609-2/","reference_id":"USN-6609-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6609-2/"},{"reference_url":"https://usn.ubuntu.com/6609-3/","reference_id":"USN-6609-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6609-3/"},{"reference_url":"https://usn.ubuntu.com/6628-1/","reference_id":"USN-6628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6628-1/"},{"reference_url":"https://usn.ubuntu.com/6628-2/","reference_id":"USN-6628-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6628-2/"},{"reference_url":"https://usn.ubuntu.com/6635-1/","reference_id":"USN-6635-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6635-1/"}],"fixed_packages":[],"aliases":["CVE-2023-6817"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rbrm-7x37-3ugv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77930?format=json","vulnerability_id":"VCID-wmdx-p5fr-yqe4","summary":"kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6931.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6931.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6931","reference_id":"","reference_type":"","scores":[{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.62987","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63016","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.6298","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63031","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63064","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.6305","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63028","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63072","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63071","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63085","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63084","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63042","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63089","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6931"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2252731","reference_id":"2252731","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2252731"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1018","reference_id":"RHSA-2024:1018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1019","reference_id":"RHSA-2024:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1607","reference_id":"RHSA-2024:1607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1614","reference_id":"RHSA-2024:1614","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1836","reference_id":"RHSA-2024:1836","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1840","reference_id":"RHSA-2024:1840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2093","reference_id":"RHSA-2024:2093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://usn.ubuntu.com/6602-1/","reference_id":"USN-6602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6602-1/"},{"reference_url":"https://usn.ubuntu.com/6603-1/","reference_id":"USN-6603-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6603-1/"},{"reference_url":"https://usn.ubuntu.com/6604-1/","reference_id":"USN-6604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6604-1/"},{"reference_url":"https://usn.ubuntu.com/6604-2/","reference_id":"USN-6604-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6604-2/"},{"reference_url":"https://usn.ubuntu.com/6605-1/","reference_id":"USN-6605-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6605-1/"},{"reference_url":"https://usn.ubuntu.com/6605-2/","reference_id":"USN-6605-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6605-2/"},{"reference_url":"https://usn.ubuntu.com/6606-1/","reference_id":"USN-6606-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6606-1/"},{"reference_url":"https://usn.ubuntu.com/6607-1/","reference_id":"USN-6607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6607-1/"},{"reference_url":"https://usn.ubuntu.com/6608-1/","reference_id":"USN-6608-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6608-1/"},{"reference_url":"https://usn.ubuntu.com/6608-2/","reference_id":"USN-6608-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6608-2/"},{"reference_url":"https://usn.ubuntu.com/6609-1/","reference_id":"USN-6609-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6609-1/"},{"reference_url":"https://usn.ubuntu.com/6609-2/","reference_id":"USN-6609-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6609-2/"},{"reference_url":"https://usn.ubuntu.com/6609-3/","reference_id":"USN-6609-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6609-3/"},{"reference_url":"https://usn.ubuntu.com/6628-1/","reference_id":"USN-6628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6628-1/"},{"reference_url":"https://usn.ubuntu.com/6628-2/","reference_id":"USN-6628-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6628-2/"},{"reference_url":"https://usn.ubuntu.com/6635-1/","reference_id":"USN-6635-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6635-1/"}],"fixed_packages":[],"aliases":["CVE-2023-6931"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wmdx-p5fr-yqe4"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-284.55.1%3Farch=el9_2"}