{"url":"http://public2.vulnerablecode.io/api/packages/95079?format=json","purl":"pkg:rpm/redhat/kernel-rt@4.18.0-513.9.1.rt7.311?arch=el8_9","type":"rpm","namespace":"redhat","name":"kernel-rt","version":"4.18.0-513.9.1.rt7.311","qualifiers":{"arch":"el8_9"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78473?format=json","vulnerability_id":"VCID-ae5d-jmsc-9ba5","summary":"kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2163.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2163.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2163","reference_id":"","reference_type":"","scores":[{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38128","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38058","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40685","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40695","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40646","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40719","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43272","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43274","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43196","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43416","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43405","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43339","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2163"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240249","reference_id":"2240249","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240249"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed","reference_id":"?id=71b547f561247897a0a14f3082730156c0533fed","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:53Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7548","reference_id":"RHSA-2023:7548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7549","reference_id":"RHSA-2023:7549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7554","reference_id":"RHSA-2023:7554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0376","reference_id":"RHSA-2024:0376","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0378","reference_id":"RHSA-2024:0378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0381","reference_id":"RHSA-2024:0381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0402","reference_id":"RHSA-2024:0402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0403","reference_id":"RHSA-2024:0403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0554","reference_id":"RHSA-2024:0554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0562","reference_id":"RHSA-2024:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0563","reference_id":"RHSA-2024:0563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0593","reference_id":"RHSA-2024:0593","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1253","reference_id":"RHSA-2024:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6340-1/","reference_id":"USN-6340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-1/"},{"reference_url":"https://usn.ubuntu.com/6340-2/","reference_id":"USN-6340-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-2/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6349-1/","reference_id":"USN-6349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6349-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-2163"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ae5d-jmsc-9ba5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78860?format=json","vulnerability_id":"VCID-ed7y-vzk5-53bs","summary":"kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45919.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45919.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45919","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05954","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05736","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0588","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05911","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05947","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06113","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06064","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06101","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06024","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06059","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06044","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06704","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07766","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45919"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151956","reference_id":"2151956","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7398","reference_id":"RHSA-2023:7398","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7398"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7548","reference_id":"RHSA-2023:7548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7549","reference_id":"RHSA-2023:7549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7549"},{"reference_url":"https://usn.ubuntu.com/6412-1/","reference_id":"USN-6412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6412-1/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45919"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ed7y-vzk5-53bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78871?format=json","vulnerability_id":"VCID-fzyb-pezt-bkbt","summary":"kernel: use-after-free due to race condition occurring in dvb_register_device()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45884.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45884.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45884","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04141","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0416","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03966","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03971","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03996","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03965","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03918","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05288","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04834","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04842","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0518","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05205","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05251","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05239","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45884"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2148510","reference_id":"2148510","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2148510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7398","reference_id":"RHSA-2023:7398","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7398"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7548","reference_id":"RHSA-2023:7548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7549","reference_id":"RHSA-2023:7549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7549"}],"fixed_packages":[],"aliases":["CVE-2022-45884"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fzyb-pezt-bkbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78984?format=json","vulnerability_id":"VCID-hxjx-3the-x3ff","summary":"kernel: use-after-free in smb2_is_status_io_timeout()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1192.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1192.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1192","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0742","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07189","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07315","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07274","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07282","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07254","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07212","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07266","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07293","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07289","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07275","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07265","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07194","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154178","reference_id":"2154178","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:48:41Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154178"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-1192","reference_id":"CVE-2023-1192","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:48:41Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-1192"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f","reference_id":"?id=d527f51331cace562393a8038d870b3e9916686f","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:48:41Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7548","reference_id":"RHSA-2023:7548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7549","reference_id":"RHSA-2023:7549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7749","reference_id":"RHSA-2023:7749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0562","reference_id":"RHSA-2024:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0563","reference_id":"RHSA-2024:0563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2006","reference_id":"RHSA-2024:2006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2008","reference_id":"RHSA-2024:2008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2008"}],"fixed_packages":[],"aliases":["CVE-2023-1192"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hxjx-3the-x3ff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78910?format=json","vulnerability_id":"VCID-mhcw-xhun-3fe7","summary":"kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3812.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3812.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3812","reference_id":"","reference_type":"","scores":[{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0077","published_at":"2026-05-05T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00726","published_at":"2026-04-18T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00766","published_at":"2026-05-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00764","published_at":"2026-04-24T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00763","published_at":"2026-04-29T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00737","published_at":"2026-04-02T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00735","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0074","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00739","published_at":"2026-04-08T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00731","published_at":"2026-04-09T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00727","published_at":"2026-04-11T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00721","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3812"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224048","reference_id":"2224048","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224048"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:8::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:8::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:9::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:9::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.6::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.0::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::nfv","reference_id":"cpe:/a:redhat:rhel_eus:9.0::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::realtime","reference_id":"cpe:/a:redhat:rhel_eus:9.0::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.2::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv","reference_id":"cpe:/a:redhat:rhel_eus:9.2::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime","reference_id":"cpe:/a:redhat:rhel_eus:9.2::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::nfv","reference_id":"cpe:/a:redhat:rhel_tus:8.2::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::realtime","reference_id":"cpe:/a:redhat:rhel_tus:8.2::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::nfv","reference_id":"cpe:/a:redhat:rhel_tus:8.4::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::realtime","reference_id":"cpe:/a:redhat:rhel_tus:8.4::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos","reference_id":"cpe:/o:redhat:rhel_aus:8.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos","reference_id":"cpe:/o:redhat:rhel_aus:8.4::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.1::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:8.1::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.1::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.2::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:8.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.2::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:8.4::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.0::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.2::baseos","reference_id":"cpe:/o:redhat:rhel_tus:8.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.2::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos","reference_id":"cpe:/o:redhat:rhel_tus:8.4::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_id":"cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-3812","reference_id":"CVE-2023-3812","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-3812"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0","reference_id":"?id=363a5328f4b0","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6799","reference_id":"RHSA-2023:6799","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6813","reference_id":"RHSA-2023:6813","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6813"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7382","reference_id":"RHSA-2023:7382","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7389","reference_id":"RHSA-2023:7389","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7411","reference_id":"RHSA-2023:7411","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7418","reference_id":"RHSA-2023:7418","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7548","reference_id":"RHSA-2023:7548","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7549","reference_id":"RHSA-2023:7549","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7554","reference_id":"RHSA-2023:7554","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0340","reference_id":"RHSA-2024:0340","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0340"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0378","reference_id":"RHSA-2024:0378","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0461","reference_id":"RHSA-2024:0461","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0554","reference_id":"RHSA-2024:0554","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0562","reference_id":"RHSA-2024:0562","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0563","reference_id":"RHSA-2024:0563","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0593","reference_id":"RHSA-2024:0593","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1961","reference_id":"RHSA-2024:1961","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:1961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2006","reference_id":"RHSA-2024:2006","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2008","reference_id":"RHSA-2024:2008","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2008"}],"fixed_packages":[],"aliases":["CVE-2023-3812"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mhcw-xhun-3fe7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78027?format=json","vulnerability_id":"VCID-s15g-xfaf-pqck","summary":"kernel: use after free in nvmet_tcp_free_crypto in NVMe","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5178.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5178.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5178","reference_id":"","reference_type":"","scores":[{"value":"0.08634","scoring_system":"epss","scoring_elements":"0.92476","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08634","scoring_system":"epss","scoring_elements":"0.92455","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08634","scoring_system":"epss","scoring_elements":"0.92466","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08634","scoring_system":"epss","scoring_elements":"0.92417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08634","scoring_system":"epss","scoring_elements":"0.9242","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08634","scoring_system":"epss","scoring_elements":"0.92432","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08634","scoring_system":"epss","scoring_elements":"0.92437","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08634","scoring_system":"epss","scoring_elements":"0.92443","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08634","scoring_system":"epss","scoring_elements":"0.92445","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08634","scoring_system":"epss","scoring_elements":"0.92454","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08634","scoring_system":"epss","scoring_elements":"0.92453","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08634","scoring_system":"epss","scoring_elements":"0.92456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08634","scoring_system":"epss","scoring_elements":"0.92459","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08634","scoring_system":"epss","scoring_elements":"0.9246","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09291","scoring_system":"epss","scoring_elements":"0.92718","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241924","reference_id":"2241924","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241924"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7418","reference_id":"RHSA-2023:7418","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7548","reference_id":"RHSA-2023:7548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7549","reference_id":"RHSA-2023:7549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7551","reference_id":"RHSA-2023:7551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7554","reference_id":"RHSA-2023:7554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7557","reference_id":"RHSA-2023:7557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7559","reference_id":"RHSA-2023:7559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0340","reference_id":"RHSA-2024:0340","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0340"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0378","reference_id":"RHSA-2024:0378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0386","reference_id":"RHSA-2024:0386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0431","reference_id":"RHSA-2024:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0432","reference_id":"RHSA-2024:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0461","reference_id":"RHSA-2024:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0554","reference_id":"RHSA-2024:0554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1278","reference_id":"RHSA-2024:1278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1278"},{"reference_url":"https://usn.ubuntu.com/6497-1/","reference_id":"USN-6497-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6497-1/"},{"reference_url":"https://usn.ubuntu.com/6534-1/","reference_id":"USN-6534-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6534-1/"},{"reference_url":"https://usn.ubuntu.com/6534-2/","reference_id":"USN-6534-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6534-2/"},{"reference_url":"https://usn.ubuntu.com/6534-3/","reference_id":"USN-6534-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6534-3/"},{"reference_url":"https://usn.ubuntu.com/6536-1/","reference_id":"USN-6536-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6536-1/"},{"reference_url":"https://usn.ubuntu.com/6537-1/","reference_id":"USN-6537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6537-1/"},{"reference_url":"https://usn.ubuntu.com/6548-1/","reference_id":"USN-6548-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6548-1/"},{"reference_url":"https://usn.ubuntu.com/6548-2/","reference_id":"USN-6548-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6548-2/"},{"reference_url":"https://usn.ubuntu.com/6548-3/","reference_id":"USN-6548-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6548-3/"},{"reference_url":"https://usn.ubuntu.com/6548-4/","reference_id":"USN-6548-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6548-4/"},{"reference_url":"https://usn.ubuntu.com/6548-5/","reference_id":"USN-6548-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6548-5/"},{"reference_url":"https://usn.ubuntu.com/6549-1/","reference_id":"USN-6549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6549-1/"},{"reference_url":"https://usn.ubuntu.com/6549-2/","reference_id":"USN-6549-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6549-2/"},{"reference_url":"https://usn.ubuntu.com/6549-3/","reference_id":"USN-6549-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6549-3/"},{"reference_url":"https://usn.ubuntu.com/6549-4/","reference_id":"USN-6549-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6549-4/"},{"reference_url":"https://usn.ubuntu.com/6549-5/","reference_id":"USN-6549-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6549-5/"},{"reference_url":"https://usn.ubuntu.com/6573-1/","reference_id":"USN-6573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6573-1/"},{"reference_url":"https://usn.ubuntu.com/6635-1/","reference_id":"USN-6635-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6635-1/"}],"fixed_packages":[],"aliases":["CVE-2023-5178"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s15g-xfaf-pqck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78873?format=json","vulnerability_id":"VCID-srrf-b9jk-5uge","summary":"kernel: use-after-free due to race condition occurring in dvb_net.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45886.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45886.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45886","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05418","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05148","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05151","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05303","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05341","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05382","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0557","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05578","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0552","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05555","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05554","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05592","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05617","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2148517","reference_id":"2148517","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2148517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7398","reference_id":"RHSA-2023:7398","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7398"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7548","reference_id":"RHSA-2023:7548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7549","reference_id":"RHSA-2023:7549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7549"},{"reference_url":"https://usn.ubuntu.com/6412-1/","reference_id":"USN-6412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6412-1/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45886"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-srrf-b9jk-5uge"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@4.18.0-513.9.1.rt7.311%3Farch=el8_9"}