{"url":"http://public2.vulnerablecode.io/api/packages/95522?format=json","purl":"pkg:rpm/redhat/kernel-rt@4.18.0-513.5.1.rt7.307?arch=el8_9","type":"rpm","namespace":"redhat","name":"kernel-rt","version":"4.18.0-513.5.1.rt7.307","qualifiers":{"arch":"el8_9"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79920?format=json","vulnerability_id":"VCID-1a4w-wmuv-bkgp","summary":"kernel: out-of-bounds write in hw_atl_utils_fw_rpc_wait() in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43975.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43975.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43975","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04968","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05265","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05184","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05226","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05227","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05215","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05049","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05071","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05104","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05118","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05076","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05059","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05005","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05011","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024989","reference_id":"2024989","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024989"},{"reference_url":"https://security.archlinux.org/AVG-2610","reference_id":"AVG-2610","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2610"},{"reference_url":"https://security.archlinux.org/AVG-2611","reference_id":"AVG-2611","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2611"},{"reference_url":"https://security.archlinux.org/AVG-2612","reference_id":"AVG-2612","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2612"},{"reference_url":"https://security.archlinux.org/AVG-2613","reference_id":"AVG-2613","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2613"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/5278-1/","reference_id":"USN-5278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5278-1/"},{"reference_url":"https://usn.ubuntu.com/5294-1/","reference_id":"USN-5294-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-1/"},{"reference_url":"https://usn.ubuntu.com/5294-2/","reference_id":"USN-5294-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-2/"},{"reference_url":"https://usn.ubuntu.com/5297-1/","reference_id":"USN-5297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5297-1/"},{"reference_url":"https://usn.ubuntu.com/5337-1/","reference_id":"USN-5337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5337-1/"},{"reference_url":"https://usn.ubuntu.com/5368-1/","reference_id":"USN-5368-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5368-1/"},{"reference_url":"https://usn.ubuntu.com/5385-1/","reference_id":"USN-5385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5385-1/"}],"fixed_packages":[],"aliases":["CVE-2021-43975"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1a4w-wmuv-bkgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78921?format=json","vulnerability_id":"VCID-1b2u-7w7f-wudv","summary":"kernel: use-after-free due to race condition in qdisc_graft()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0590.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0590.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0590","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01789","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01801","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01804","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02665","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02668","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02801","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02775","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02646","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02766","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02756","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02744","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05764","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165741","reference_id":"2165741","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5627","reference_id":"RHSA-2023:5627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7382","reference_id":"RHSA-2023:7382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7389","reference_id":"RHSA-2023:7389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7389"},{"reference_url":"https://usn.ubuntu.com/5850-1/","reference_id":"USN-5850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5850-1/"},{"reference_url":"https://usn.ubuntu.com/5851-1/","reference_id":"USN-5851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5851-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5876-1/","reference_id":"USN-5876-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5876-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5878-1/","reference_id":"USN-5878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5878-1/"},{"reference_url":"https://usn.ubuntu.com/5879-1/","reference_id":"USN-5879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5879-1/"},{"reference_url":"https://usn.ubuntu.com/6284-1/","reference_id":"USN-6284-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6284-1/"},{"reference_url":"https://usn.ubuntu.com/6301-1/","reference_id":"USN-6301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6301-1/"},{"reference_url":"https://usn.ubuntu.com/6312-1/","reference_id":"USN-6312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6312-1/"},{"reference_url":"https://usn.ubuntu.com/6314-1/","reference_id":"USN-6314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6314-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6337-1/","reference_id":"USN-6337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6337-1/"}],"fixed_packages":[],"aliases":["CVE-2023-0590"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1b2u-7w7f-wudv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78864?format=json","vulnerability_id":"VCID-1vns-urfn-93dn","summary":"kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28328.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28328.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28328","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02172","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02196","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02129","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02141","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02205","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02195","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0223","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02189","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02173","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02171","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02156","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03278","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28328"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28328","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28328"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177389","reference_id":"2177389","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:15Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177389"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:15Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:15Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/5981-1/","reference_id":"USN-5981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5981-1/"},{"reference_url":"https://usn.ubuntu.com/5982-1/","reference_id":"USN-5982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5982-1/"},{"reference_url":"https://usn.ubuntu.com/5984-1/","reference_id":"USN-5984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5984-1/"},{"reference_url":"https://usn.ubuntu.com/5987-1/","reference_id":"USN-5987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5987-1/"},{"reference_url":"https://usn.ubuntu.com/5991-1/","reference_id":"USN-5991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5991-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6004-1/","reference_id":"USN-6004-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6004-1/"},{"reference_url":"https://usn.ubuntu.com/6009-1/","reference_id":"USN-6009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6009-1/"},{"reference_url":"https://usn.ubuntu.com/6024-1/","reference_id":"USN-6024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6024-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6149-1/","reference_id":"USN-6149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6149-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"}],"fixed_packages":[],"aliases":["CVE-2023-28328"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1vns-urfn-93dn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78508?format=json","vulnerability_id":"VCID-2n9k-dqfk-gkb9","summary":"kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31084.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31084.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-31084","reference_id":"","reference_type":"","scores":[{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00829","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00861","published_at":"2026-05-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0083","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00834","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00831","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0082","published_at":"2026-04-18T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00815","published_at":"2026-04-16T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00816","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00865","published_at":"2026-04-21T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00867","published_at":"2026-05-05T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00869","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213139","reference_id":"2213139","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213139"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/","reference_id":"6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/","reference_id":"AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/"},{"reference_url":"https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/","reference_id":"CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5448","reference_id":"dsa-5448","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://www.debian.org/security/2023/dsa-5448"},{"reference_url":"https://www.debian.org/security/2023/dsa-5480","reference_id":"dsa-5480","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://www.debian.org/security/2023/dsa-5480"},{"reference_url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946","reference_id":"?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230929-0003/","reference_id":"ntap-20230929-0003","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230929-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/6231-1/","reference_id":"USN-6231-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6231-1/"},{"reference_url":"https://usn.ubuntu.com/6309-1/","reference_id":"USN-6309-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6309-1/"},{"reference_url":"https://usn.ubuntu.com/6327-1/","reference_id":"USN-6327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6327-1/"},{"reference_url":"https://usn.ubuntu.com/6338-1/","reference_id":"USN-6338-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6338-1/"},{"reference_url":"https://usn.ubuntu.com/6338-2/","reference_id":"USN-6338-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6338-2/"},{"reference_url":"https://usn.ubuntu.com/6339-1/","reference_id":"USN-6339-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-1/"},{"reference_url":"https://usn.ubuntu.com/6339-2/","reference_id":"USN-6339-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-2/"},{"reference_url":"https://usn.ubuntu.com/6339-3/","reference_id":"USN-6339-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-3/"},{"reference_url":"https://usn.ubuntu.com/6339-4/","reference_id":"USN-6339-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-4/"},{"reference_url":"https://usn.ubuntu.com/6340-1/","reference_id":"USN-6340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-1/"},{"reference_url":"https://usn.ubuntu.com/6340-2/","reference_id":"USN-6340-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-2/"},{"reference_url":"https://usn.ubuntu.com/6342-1/","reference_id":"USN-6342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6342-1/"},{"reference_url":"https://usn.ubuntu.com/6342-2/","reference_id":"USN-6342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6342-2/"},{"reference_url":"https://usn.ubuntu.com/6344-1/","reference_id":"USN-6344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6344-1/"},{"reference_url":"https://usn.ubuntu.com/6349-1/","reference_id":"USN-6349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6349-1/"},{"reference_url":"https://usn.ubuntu.com/6350-1/","reference_id":"USN-6350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6350-1/"},{"reference_url":"https://usn.ubuntu.com/6351-1/","reference_id":"USN-6351-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6351-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-31084"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2n9k-dqfk-gkb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79048?format=json","vulnerability_id":"VCID-4gq7-1egy-p7a4","summary":"kernel: vmwgfx: use-after-free in vmw_cmd_res_check","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38457.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38457.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38457","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.129","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1289","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12969","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1302","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1298","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12944","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.128","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12803","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13192","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13095","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13513","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13249","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13315","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13322","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13295","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133455","reference_id":"2133455","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4823","reference_id":"RHSA-2024:4823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4831","reference_id":"RHSA-2024:4831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4831"}],"fixed_packages":[],"aliases":["CVE-2022-38457"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4gq7-1egy-p7a4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78337?format=json","vulnerability_id":"VCID-5m63-9wck-6ud6","summary":"kernel: saa7134: race condition leading to use-after-free in saa7134_finidev()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35823.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35823.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-35823","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01137","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01065","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.0113","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01136","published_at":"2026-05-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00958","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00937","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00942","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00953","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0095","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00954","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00949","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00938","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-35823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35823"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215835","reference_id":"2215835","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215835"},{"reference_url":"https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/","reference_id":"49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/"}],"url":"https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2","reference_id":"ChangeLog-6.3.2","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30cf57da176cca80f11df0d9b7f71581fe601389","reference_id":"?id=30cf57da176cca80f11df0d9b7f71581fe601389","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30cf57da176cca80f11df0d9b7f71581fe601389"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230803-0002/","reference_id":"ntap-20230803-0002","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230803-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://lore.kernel.org/lkml/20230318085023.832510-1-zyytlz.wz%40163.com/t/","reference_id":"t","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/"}],"url":"https://lore.kernel.org/lkml/20230318085023.832510-1-zyytlz.wz%40163.com/t/"},{"reference_url":"https://usn.ubuntu.com/6283-1/","reference_id":"USN-6283-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6283-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6340-1/","reference_id":"USN-6340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-1/"},{"reference_url":"https://usn.ubuntu.com/6340-2/","reference_id":"USN-6340-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-2/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6349-1/","reference_id":"USN-6349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6349-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-35823"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5m63-9wck-6ud6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78664?format=json","vulnerability_id":"VCID-69a4-qgg3-hkg5","summary":"kernel: vmwgfx: race condition leading to information disclosure vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33951.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33951.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33951","reference_id":"","reference_type":"","scores":[{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00304","published_at":"2026-05-07T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00289","published_at":"2026-04-16T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00312","published_at":"2026-04-24T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00306","published_at":"2026-04-29T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00303","published_at":"2026-05-05T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.0031","published_at":"2026-04-26T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00308","published_at":"2026-04-04T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00299","published_at":"2026-04-07T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00297","published_at":"2026-04-08T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00296","published_at":"2026-04-11T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00293","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33951"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218195","reference_id":"2218195","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218195"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:8::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:8::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:9::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:9::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.2::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv","reference_id":"cpe:/a:redhat:rhel_eus:9.2::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime","reference_id":"cpe:/a:redhat:rhel_eus:9.2::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-33951","reference_id":"CVE-2023-33951","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-33951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4823","reference_id":"RHSA-2024:4823","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4831","reference_id":"RHSA-2024:4831","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4831"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/","reference_id":"ZDI-CAN-20110","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/"}],"fixed_packages":[],"aliases":["CVE-2023-33951"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-69a4-qgg3-hkg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78662?format=json","vulnerability_id":"VCID-6ehx-j3nb-2ffn","summary":"kernel: mpls: double free on sysctl allocation failure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26545.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26545.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-26545","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03275","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03342","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03294","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.033","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03321","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03279","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03251","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0323","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03214","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03334","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03325","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03324","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0337","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0332","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03285","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-26545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26545"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182443","reference_id":"2182443","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182443"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.13","reference_id":"ChangeLog-6.1.13","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.13"},{"reference_url":"https://github.com/torvalds/linux/commit/fda6c89fe3d9aca073495a664e1d5aea28cd4377","reference_id":"fda6c89fe3d9aca073495a664e1d5aea28cd4377","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"}],"url":"https://github.com/torvalds/linux/commit/fda6c89fe3d9aca073495a664e1d5aea28cd4377"},{"reference_url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377","reference_id":"?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"}],"url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230316-0009/","reference_id":"ntap-20230316-0009","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230316-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://usn.ubuntu.com/5978-1/","reference_id":"USN-5978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5978-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6024-1/","reference_id":"USN-6024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6024-1/"},{"reference_url":"https://usn.ubuntu.com/6025-1/","reference_id":"USN-6025-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6025-1/"},{"reference_url":"https://usn.ubuntu.com/6027-1/","reference_id":"USN-6027-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6027-1/"},{"reference_url":"https://usn.ubuntu.com/6029-1/","reference_id":"USN-6029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6029-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6040-1/","reference_id":"USN-6040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6040-1/"},{"reference_url":"https://usn.ubuntu.com/6057-1/","reference_id":"USN-6057-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6057-1/"},{"reference_url":"https://usn.ubuntu.com/6071-1/","reference_id":"USN-6071-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6071-1/"},{"reference_url":"https://usn.ubuntu.com/6072-1/","reference_id":"USN-6072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6072-1/"},{"reference_url":"https://usn.ubuntu.com/6093-1/","reference_id":"USN-6093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6093-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2023-26545"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ehx-j3nb-2ffn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78724?format=json","vulnerability_id":"VCID-6nm8-f9v9-bqe3","summary":"kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0458.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0458","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24773","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24655","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24716","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24675","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24618","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24631","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24621","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24504","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24491","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24323","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24585","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30827","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0458"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193219","reference_id":"2193219","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193219"},{"reference_url":"https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11","reference_id":"739790605705ddcf18f21782b9c99ad7d53a8c11","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/"}],"url":"https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4377","reference_id":"RHSA-2023:4377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4378","reference_id":"RHSA-2023:4378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4801","reference_id":"RHSA-2023:4801","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4801"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4814","reference_id":"RHSA-2023:4814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7","reference_id":"sys.c?id=v6.1.8&id2=v6.1.7","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6093-1/","reference_id":"USN-6093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6093-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6254-1/","reference_id":"USN-6254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6254-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"},{"reference_url":"https://usn.ubuntu.com/6341-1/","reference_id":"USN-6341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6341-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"}],"fixed_packages":[],"aliases":["CVE-2023-0458"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6nm8-f9v9-bqe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78339?format=json","vulnerability_id":"VCID-6znz-cyqz-7qeh","summary":"kernel: r592: race condition leading to use-after-free in r592_remove()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35825.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35825.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215837","reference_id":"2215837","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"}],"fixed_packages":[],"aliases":["CVE-2023-35825"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6znz-cyqz-7qeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78720?format=json","vulnerability_id":"VCID-86j6-rxsj-jucj","summary":"kernel: sctp: fail if no bound addresses can be used for a given scope","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1074.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1074.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1074","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01609","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01594","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01618","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01592","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01974","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02018","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02004","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02001","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02031","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01981","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02421","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02428","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/01/23/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/01/23/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173430","reference_id":"2173430","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173430"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/05/4","reference_id":"4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/05/4"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f","reference_id":"?id=458e279f861d3f61796894cd158b780765a1569f","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0723","reference_id":"RHSA-2024:0723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0725","reference_id":"RHSA-2024:0725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://usn.ubuntu.com/5978-1/","reference_id":"USN-5978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5978-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6025-1/","reference_id":"USN-6025-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6025-1/"},{"reference_url":"https://usn.ubuntu.com/6027-1/","reference_id":"USN-6027-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6027-1/"},{"reference_url":"https://usn.ubuntu.com/6029-1/","reference_id":"USN-6029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6029-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6031-1/","reference_id":"USN-6031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6031-1/"},{"reference_url":"https://usn.ubuntu.com/6032-1/","reference_id":"USN-6032-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6032-1/"},{"reference_url":"https://usn.ubuntu.com/6040-1/","reference_id":"USN-6040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6040-1/"},{"reference_url":"https://usn.ubuntu.com/6057-1/","reference_id":"USN-6057-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6057-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6093-1/","reference_id":"USN-6093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6093-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1074"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-86j6-rxsj-jucj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78529?format=json","vulnerability_id":"VCID-8uzn-q3h8-8qfs","summary":"kernel: KVM: nVMX: missing consistency checks for CR0 and CR4","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30456.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30456.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-30456","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01347","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0134","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01901","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01963","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01911","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03246","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03233","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03295","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03267","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03223","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03282","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03291","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03297","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03318","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-30456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5","reference_id":"112e66017bff7f2837030f34c2bc19501e9212d5","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"}],"url":"https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188468","reference_id":"2188468","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188468"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8","reference_id":"ChangeLog-6.2.8","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8"},{"reference_url":"http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0096-1.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"}],"url":"http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230511-0007/","reference_id":"ntap-20230511-0007","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230511-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/6033-1/","reference_id":"USN-6033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6033-1/"},{"reference_url":"https://usn.ubuntu.com/6123-1/","reference_id":"USN-6123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6123-1/"},{"reference_url":"https://usn.ubuntu.com/6124-1/","reference_id":"USN-6124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6124-1/"},{"reference_url":"https://usn.ubuntu.com/6127-1/","reference_id":"USN-6127-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6127-1/"},{"reference_url":"https://usn.ubuntu.com/6130-1/","reference_id":"USN-6130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6130-1/"},{"reference_url":"https://usn.ubuntu.com/6131-1/","reference_id":"USN-6131-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6131-1/"},{"reference_url":"https://usn.ubuntu.com/6132-1/","reference_id":"USN-6132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6132-1/"},{"reference_url":"https://usn.ubuntu.com/6135-1/","reference_id":"USN-6135-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6135-1/"},{"reference_url":"https://usn.ubuntu.com/6149-1/","reference_id":"USN-6149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6149-1/"},{"reference_url":"https://usn.ubuntu.com/6150-1/","reference_id":"USN-6150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6150-1/"},{"reference_url":"https://usn.ubuntu.com/6162-1/","reference_id":"USN-6162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6162-1/"},{"reference_url":"https://usn.ubuntu.com/6175-1/","reference_id":"USN-6175-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6175-1/"},{"reference_url":"https://usn.ubuntu.com/6186-1/","reference_id":"USN-6186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6186-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"},{"reference_url":"https://usn.ubuntu.com/6699-1/","reference_id":"USN-6699-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6699-1/"}],"fixed_packages":[],"aliases":["CVE-2023-30456"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8uzn-q3h8-8qfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78458?format=json","vulnerability_id":"VCID-a2u7-uepg-jfa1","summary":"kernel: gfs2: NULL pointer dereference in gfs2_evict_inode()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3212.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3212","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01721","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0173","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01729","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01732","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01741","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01727","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01718","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01705","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01706","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02117","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02125","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02093","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02097","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2214348","reference_id":"2214348","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2214348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://usn.ubuntu.com/6231-1/","reference_id":"USN-6231-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6231-1/"},{"reference_url":"https://usn.ubuntu.com/6339-1/","reference_id":"USN-6339-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-1/"},{"reference_url":"https://usn.ubuntu.com/6339-2/","reference_id":"USN-6339-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-2/"},{"reference_url":"https://usn.ubuntu.com/6339-3/","reference_id":"USN-6339-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-3/"},{"reference_url":"https://usn.ubuntu.com/6339-4/","reference_id":"USN-6339-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6339-4/"},{"reference_url":"https://usn.ubuntu.com/6350-1/","reference_id":"USN-6350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6350-1/"},{"reference_url":"https://usn.ubuntu.com/6351-1/","reference_id":"USN-6351-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6351-1/"},{"reference_url":"https://usn.ubuntu.com/6388-1/","reference_id":"USN-6388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6388-1/"},{"reference_url":"https://usn.ubuntu.com/6396-1/","reference_id":"USN-6396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-1/"},{"reference_url":"https://usn.ubuntu.com/6396-2/","reference_id":"USN-6396-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-2/"},{"reference_url":"https://usn.ubuntu.com/6396-3/","reference_id":"USN-6396-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-3/"},{"reference_url":"https://usn.ubuntu.com/6412-1/","reference_id":"USN-6412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6412-1/"},{"reference_url":"https://usn.ubuntu.com/6417-1/","reference_id":"USN-6417-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6417-1/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3212"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a2u7-uepg-jfa1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78560?format=json","vulnerability_id":"VCID-a5jg-3sk6-eqhw","summary":"kernel: tun: avoid double free in tun_free_netdev","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4744.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4744.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4744","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24591","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24747","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2452","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24637","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24654","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24569","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26909","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26902","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26835","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2669","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26758","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26993","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156322","reference_id":"2156322","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156322"},{"reference_url":"http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html","reference_id":"CentOS-Stream-9-Missing-Kernel-Security-Fix.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/"}],"url":"http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e","reference_id":"?id=158b515f703e","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230526-0009/","reference_id":"ntap-20230526-0009","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230526-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1466","reference_id":"RHSA-2023:1466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1466"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1467","reference_id":"RHSA-2023:1467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1467"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1468","reference_id":"RHSA-2023:1468","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1469","reference_id":"RHSA-2023:1469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1470","reference_id":"RHSA-2023:1470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1471","reference_id":"RHSA-2023:1471","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"}],"fixed_packages":[],"aliases":["CVE-2022-4744"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a5jg-3sk6-eqhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78110?format=json","vulnerability_id":"VCID-amu6-u9vr-x3gf","summary":"kernel: Race between task migrating pages and another task calling exit_mmap to release those same pages getting invalid opcode BUG in include/linux/swapops.h","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4732.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4732.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4732","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02264","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02263","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02285","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02268","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02256","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02254","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02235","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02245","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02339","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02317","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0231","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02353","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02327","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02332","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4732"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236982","reference_id":"2236982","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"}],"fixed_packages":[],"aliases":["CVE-2023-4732"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-amu6-u9vr-x3gf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78257?format=json","vulnerability_id":"VCID-bdv6-qrn1-aqhv","summary":"kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3611.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3611.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3611","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02788","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02675","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02683","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02705","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02678","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02664","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02661","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02643","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02651","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02764","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02754","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02741","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02798","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02772","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225191","reference_id":"2225191","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225191"},{"reference_url":"https://kernel.dance/3e337087c3b5805fe0b8a46ba622a962880b5d64","reference_id":"3e337087c3b5805fe0b8a46ba622a962880b5d64","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/"}],"url":"https://kernel.dance/3e337087c3b5805fe0b8a46ba622a962880b5d64"},{"reference_url":"https://www.debian.org/security/2023/dsa-5480","reference_id":"dsa-5480","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/"}],"url":"https://www.debian.org/security/2023/dsa-5480"},{"reference_url":"https://www.debian.org/security/2023/dsa-5492","reference_id":"dsa-5492","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/"}],"url":"https://www.debian.org/security/2023/dsa-5492"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64","reference_id":"?id=3e337087c3b5805fe0b8a46ba622a962880b5d64","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230908-0002/","reference_id":"ntap-20230908-0002","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230908-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7419","reference_id":"RHSA-2023:7419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0261","reference_id":"RHSA-2024:0261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0262","reference_id":"RHSA-2024:0262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0262"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0378","reference_id":"RHSA-2024:0378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0554","reference_id":"RHSA-2024:0554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1278","reference_id":"RHSA-2024:1278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1367","reference_id":"RHSA-2024:1367","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1367"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1377","reference_id":"RHSA-2024:1377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1382","reference_id":"RHSA-2024:1382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1831","reference_id":"RHSA-2024:1831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1831"},{"reference_url":"https://usn.ubuntu.com/6285-1/","reference_id":"USN-6285-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6285-1/"},{"reference_url":"https://usn.ubuntu.com/6309-1/","reference_id":"USN-6309-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6309-1/"},{"reference_url":"https://usn.ubuntu.com/6315-1/","reference_id":"USN-6315-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6315-1/"},{"reference_url":"https://usn.ubuntu.com/6317-1/","reference_id":"USN-6317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6317-1/"},{"reference_url":"https://usn.ubuntu.com/6318-1/","reference_id":"USN-6318-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6318-1/"},{"reference_url":"https://usn.ubuntu.com/6321-1/","reference_id":"USN-6321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6321-1/"},{"reference_url":"https://usn.ubuntu.com/6324-1/","reference_id":"USN-6324-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6324-1/"},{"reference_url":"https://usn.ubuntu.com/6325-1/","reference_id":"USN-6325-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6325-1/"},{"reference_url":"https://usn.ubuntu.com/6327-1/","reference_id":"USN-6327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6327-1/"},{"reference_url":"https://usn.ubuntu.com/6328-1/","reference_id":"USN-6328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6328-1/"},{"reference_url":"https://usn.ubuntu.com/6329-1/","reference_id":"USN-6329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6329-1/"},{"reference_url":"https://usn.ubuntu.com/6330-1/","reference_id":"USN-6330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6330-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6341-1/","reference_id":"USN-6341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6341-1/"},{"reference_url":"https://usn.ubuntu.com/6342-1/","reference_id":"USN-6342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6342-1/"},{"reference_url":"https://usn.ubuntu.com/6342-2/","reference_id":"USN-6342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6342-2/"},{"reference_url":"https://usn.ubuntu.com/6346-1/","reference_id":"USN-6346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6346-1/"},{"reference_url":"https://usn.ubuntu.com/6348-1/","reference_id":"USN-6348-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6348-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3611"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bdv6-qrn1-aqhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78966?format=json","vulnerability_id":"VCID-brwq-qcbd-c3ep","summary":"kernel: x86/mm: Randomize per-cpu entry area","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0597.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0597","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05031","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05278","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05169","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05194","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05237","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05239","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05227","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05081","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05104","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05086","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0507","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05016","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05022","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/07/28/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T19:17:29Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/07/28/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165926","reference_id":"2165926","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165926"},{"reference_url":"https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80","reference_id":"97e3d26b5e5f371b3ee223d94dd123e6c442ba80","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T19:17:29Z/"}],"url":"https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10262","reference_id":"RHSA-2024:10262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10262"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10772","reference_id":"RHSA-2024:10772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10773","reference_id":"RHSA-2024:10773","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10773"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://usn.ubuntu.com/6206-1/","reference_id":"USN-6206-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6206-1/"},{"reference_url":"https://usn.ubuntu.com/6235-1/","reference_id":"USN-6235-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6235-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6440-1/","reference_id":"USN-6440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-1/"},{"reference_url":"https://usn.ubuntu.com/6440-2/","reference_id":"USN-6440-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-2/"},{"reference_url":"https://usn.ubuntu.com/6440-3/","reference_id":"USN-6440-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-3/"},{"reference_url":"https://usn.ubuntu.com/6462-1/","reference_id":"USN-6462-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6462-1/"},{"reference_url":"https://usn.ubuntu.com/6462-2/","reference_id":"USN-6462-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6462-2/"}],"fixed_packages":[],"aliases":["CVE-2023-0597"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-brwq-qcbd-c3ep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79345?format=json","vulnerability_id":"VCID-c3z5-1arv-kqck","summary":"kernel: ext4: use-after-free in ext4_xattr_set_entry()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2513.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2513.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2513","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02134","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02118","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02093","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02106","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02193","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02163","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02154","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02146","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02142","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02137","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02122","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2513"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/","reference_id":"20220616021358.2504451-1-libaokun1%40huawei.com","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/"}],"url":"https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193097","reference_id":"2193097","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193097"},{"reference_url":"https://github.com/torvalds/linux/commit/67d7d8ad99be","reference_id":"67d7d8ad99be","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/"}],"url":"https://github.com/torvalds/linux/commit/67d7d8ad99be"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15649","reference_id":"RHSA-2025:15649","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15649"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15656","reference_id":"RHSA-2025:15656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15658","reference_id":"RHSA-2025:15658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15660","reference_id":"RHSA-2025:15660","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15660"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15670","reference_id":"RHSA-2025:15670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15670"},{"reference_url":"https://usn.ubuntu.com/6254-1/","reference_id":"USN-6254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6254-1/"}],"fixed_packages":[],"aliases":["CVE-2023-2513"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c3z5-1arv-kqck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78214?format=json","vulnerability_id":"VCID-cf2b-yvwj-wyh1","summary":"kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4155.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4155.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4155","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01885","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01869","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01846","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01845","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01931","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02119","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02073","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0207","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02098","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02092","published_at":"2026-04-26T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00715","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00705","published_at":"2026-04-09T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00713","published_at":"2026-04-02T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0071","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00714","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4155"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213802","reference_id":"2213802","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:49:34Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213802"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-4155","reference_id":"CVE-2023-4155","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:49:34Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-4155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3859","reference_id":"RHSA-2024:3859","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3859"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4740","reference_id":"RHSA-2024:4740","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4740"},{"reference_url":"https://usn.ubuntu.com/6343-1/","reference_id":"USN-6343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6343-1/"},{"reference_url":"https://usn.ubuntu.com/6412-1/","reference_id":"USN-6412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6412-1/"},{"reference_url":"https://usn.ubuntu.com/6416-1/","reference_id":"USN-6416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-1/"},{"reference_url":"https://usn.ubuntu.com/6416-2/","reference_id":"USN-6416-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-2/"},{"reference_url":"https://usn.ubuntu.com/6416-3/","reference_id":"USN-6416-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-3/"},{"reference_url":"https://usn.ubuntu.com/6445-1/","reference_id":"USN-6445-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-1/"},{"reference_url":"https://usn.ubuntu.com/6445-2/","reference_id":"USN-6445-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-2/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2023-4155"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cf2b-yvwj-wyh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78602?format=json","vulnerability_id":"VCID-ebxk-u1b1-zybq","summary":"kernel: use-after-free bug in remove function xgene_hwmon_remove","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1855.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1855.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1855","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02657","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0269","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02688","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02666","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02647","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02655","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02767","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04025","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03983","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03999","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03979","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1855"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/","reference_id":"20230318122758.2140868-1-linux%40roeck-us.net","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/"}],"url":"https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184578","reference_id":"2184578","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184578"},{"reference_url":"https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1","reference_id":"cb090e64cf25602b9adaf32d5dfc9c8bec493cd1","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/"}],"url":"https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://usn.ubuntu.com/6033-1/","reference_id":"USN-6033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6033-1/"},{"reference_url":"https://usn.ubuntu.com/6175-1/","reference_id":"USN-6175-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6175-1/"},{"reference_url":"https://usn.ubuntu.com/6186-1/","reference_id":"USN-6186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6186-1/"},{"reference_url":"https://usn.ubuntu.com/6284-1/","reference_id":"USN-6284-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6284-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6301-1/","reference_id":"USN-6301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6301-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6312-1/","reference_id":"USN-6312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6312-1/"},{"reference_url":"https://usn.ubuntu.com/6314-1/","reference_id":"USN-6314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6314-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6337-1/","reference_id":"USN-6337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6337-1/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1855"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ebxk-u1b1-zybq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79923?format=json","vulnerability_id":"VCID-fk99-ervq-v3fx","summary":"kernel: ovl: fix use after free in struct ovl_aio_req","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1252.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1252.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1252","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05235","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05254","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05154","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05182","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06218","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06249","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06258","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06276","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06391","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06095","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0609","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06046","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06055","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1252"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176140","reference_id":"2176140","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8107","reference_id":"RHSA-2024:8107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8613","reference_id":"RHSA-2024:8613","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8613"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8614","reference_id":"RHSA-2024:8614","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8614"}],"fixed_packages":[],"aliases":["CVE-2023-1252"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fk99-ervq-v3fx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78863?format=json","vulnerability_id":"VCID-ghef-adjn-rqcb","summary":"kernel: denial of service in tipc_conn_close","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1382.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1382.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1382","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01073","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01096","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01095","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01079","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01074","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01068","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01077","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03381","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03426","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03382","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0339","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03379","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04729","published_at":"2026-05-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00895","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00893","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177371","reference_id":"2177371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177371"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u","reference_id":"#u","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:20Z/"}],"url":"https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6739-1/","reference_id":"USN-6739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6739-1/"},{"reference_url":"https://usn.ubuntu.com/6740-1/","reference_id":"USN-6740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6740-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1382"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ghef-adjn-rqcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79042?format=json","vulnerability_id":"VCID-gpdn-rup2-7fey","summary":"kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40133.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-40133","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.129","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1289","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12969","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1302","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1298","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12944","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.128","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12803","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13192","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13095","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13513","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13249","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13315","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13322","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13295","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-40133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133453","reference_id":"2133453","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133453"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4823","reference_id":"RHSA-2024:4823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4831","reference_id":"RHSA-2024:4831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4831"}],"fixed_packages":[],"aliases":["CVE-2022-40133"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gpdn-rup2-7fey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78605?format=json","vulnerability_id":"VCID-hvkn-sk3f-pud6","summary":"kernel: Use after free bug in btsdio_remove due to race condition","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1989.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1989.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1989","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04404","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04252","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04242","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04232","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04385","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04485","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0446","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04549","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0454","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0511","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05652","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05592","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05597","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1989"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2185945","reference_id":"2185945","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2185945"},{"reference_url":"https://www.debian.org/security/2023/dsa-5492","reference_id":"dsa-5492","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"}],"url":"https://www.debian.org/security/2023/dsa-5492"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088","reference_id":"?id=f132c2d13088","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230601-0004/","reference_id":"ntap-20230601-0004","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230601-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4740","reference_id":"RHSA-2024:4740","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4740"},{"reference_url":"https://usn.ubuntu.com/6033-1/","reference_id":"USN-6033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6033-1/"},{"reference_url":"https://usn.ubuntu.com/6175-1/","reference_id":"USN-6175-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6175-1/"},{"reference_url":"https://usn.ubuntu.com/6186-1/","reference_id":"USN-6186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6186-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1989"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hvkn-sk3f-pud6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78356?format=json","vulnerability_id":"VCID-j7z5-3htn-vkd2","summary":"kernel: hash collisions in the IPv6 connection lookup table","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1206.json","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1206","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11447","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11294","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11376","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1144","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11408","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11378","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11238","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11366","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11307","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12053","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12133","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12242","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12191","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2175903","reference_id":"2175903","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2175903"},{"reference_url":"https://www.debian.org/security/2023/dsa-5480","reference_id":"dsa-5480","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"}],"url":"https://www.debian.org/security/2023/dsa-5480"},{"reference_url":"https://www.debian.org/security/2023/dsa-5492","reference_id":"dsa-5492","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"}],"url":"https://www.debian.org/security/2023/dsa-5492"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230929-0006/","reference_id":"ntap-20230929-0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230929-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5603","reference_id":"RHSA-2023:5603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5604","reference_id":"RHSA-2023:5604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5627","reference_id":"RHSA-2023:5627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://usn.ubuntu.com/6343-1/","reference_id":"USN-6343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6343-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6412-1/","reference_id":"USN-6412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6412-1/"},{"reference_url":"https://usn.ubuntu.com/6416-1/","reference_id":"USN-6416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-1/"},{"reference_url":"https://usn.ubuntu.com/6416-2/","reference_id":"USN-6416-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-2/"},{"reference_url":"https://usn.ubuntu.com/6416-3/","reference_id":"USN-6416-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-3/"},{"reference_url":"https://usn.ubuntu.com/6417-1/","reference_id":"USN-6417-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6417-1/"},{"reference_url":"https://usn.ubuntu.com/6439-1/","reference_id":"USN-6439-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6439-1/"},{"reference_url":"https://usn.ubuntu.com/6439-2/","reference_id":"USN-6439-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6439-2/"},{"reference_url":"https://usn.ubuntu.com/6440-1/","reference_id":"USN-6440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-1/"},{"reference_url":"https://usn.ubuntu.com/6440-2/","reference_id":"USN-6440-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-2/"},{"reference_url":"https://usn.ubuntu.com/6440-3/","reference_id":"USN-6440-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-3/"},{"reference_url":"https://usn.ubuntu.com/6445-1/","reference_id":"USN-6445-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-1/"},{"reference_url":"https://usn.ubuntu.com/6445-2/","reference_id":"USN-6445-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-2/"},{"reference_url":"https://usn.ubuntu.com/6460-1/","reference_id":"USN-6460-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6460-1/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1206"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j7z5-3htn-vkd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78892?format=json","vulnerability_id":"VCID-j8ze-t6w6-ekak","summary":"kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42895","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21243","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21444","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21296","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21294","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21274","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21176","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22918","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22755","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22829","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22882","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22902","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22865","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22822","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22816","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2147356","reference_id":"2147356","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2147356"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e","reference_id":"#b1a2cd50c0357f243b7435a732b4e62ba3157a2e","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/"}],"url":"https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e"},{"reference_url":"https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e","reference_id":"b1a2cd50c0357f243b7435a732b4e62ba3157a2e","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/"}],"url":"https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1877","reference_id":"RHSA-2024:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2621","reference_id":"RHSA-2024:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2621"},{"reference_url":"https://usn.ubuntu.com/5780-1/","reference_id":"USN-5780-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5780-1/"},{"reference_url":"https://usn.ubuntu.com/5850-1/","reference_id":"USN-5850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5850-1/"},{"reference_url":"https://usn.ubuntu.com/5851-1/","reference_id":"USN-5851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5851-1/"},{"reference_url":"https://usn.ubuntu.com/5853-1/","reference_id":"USN-5853-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5853-1/"},{"reference_url":"https://usn.ubuntu.com/5858-1/","reference_id":"USN-5858-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5858-1/"},{"reference_url":"https://usn.ubuntu.com/5859-1/","reference_id":"USN-5859-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5859-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5874-1/","reference_id":"USN-5874-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5874-1/"},{"reference_url":"https://usn.ubuntu.com/5875-1/","reference_id":"USN-5875-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5875-1/"},{"reference_url":"https://usn.ubuntu.com/5876-1/","reference_id":"USN-5876-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5876-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5878-1/","reference_id":"USN-5878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5878-1/"},{"reference_url":"https://usn.ubuntu.com/5879-1/","reference_id":"USN-5879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5879-1/"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5884-1/","reference_id":"USN-5884-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5884-1/"},{"reference_url":"https://usn.ubuntu.com/5909-1/","reference_id":"USN-5909-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5909-1/"},{"reference_url":"https://usn.ubuntu.com/5918-1/","reference_id":"USN-5918-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5918-1/"},{"reference_url":"https://usn.ubuntu.com/5919-1/","reference_id":"USN-5919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5919-1/"},{"reference_url":"https://usn.ubuntu.com/5920-1/","reference_id":"USN-5920-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5920-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5925-1/","reference_id":"USN-5925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5925-1/"},{"reference_url":"https://usn.ubuntu.com/5926-1/","reference_id":"USN-5926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5926-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42895"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j8ze-t6w6-ekak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78665?format=json","vulnerability_id":"VCID-jt33-xayh-5ke1","summary":"kernel: vmwgfx: double free within the handling of vmw_buffer_object objects","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33952.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33952.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33952","reference_id":"","reference_type":"","scores":[{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00982","published_at":"2026-05-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00941","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00935","published_at":"2026-04-18T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00985","published_at":"2026-04-21T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00987","published_at":"2026-04-24T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00991","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00984","published_at":"2026-05-05T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00946","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0095","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00945","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00934","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00929","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0093","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00927","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218212","reference_id":"2218212","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218212"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:8::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:8::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:9::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:9::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.2::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv","reference_id":"cpe:/a:redhat:rhel_eus:9.2::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime","reference_id":"cpe:/a:redhat:rhel_eus:9.2::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-33952","reference_id":"CVE-2023-33952","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-33952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4823","reference_id":"RHSA-2024:4823","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4831","reference_id":"RHSA-2024:4831","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4831"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292","reference_id":"ZDI-CAN-20292","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292"}],"fixed_packages":[],"aliases":["CVE-2023-33952"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jt33-xayh-5ke1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78716?format=json","vulnerability_id":"VCID-jure-kwde-eufu","summary":"kernel: fbcon: shift-out-of-bounds in fbcon_set_font()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3161.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3161.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3161","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01902","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02315","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02324","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02302","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02294","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02338","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02311","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01915","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02249","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0227","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02253","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02242","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0224","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02221","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02231","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3161"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213485","reference_id":"2213485","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:24Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213485"},{"reference_url":"https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be","reference_id":"2b09d5d364986f724f17001ccfe4126b9b43a0be","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:24Z/"}],"url":"https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5603","reference_id":"RHSA-2023:5603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5604","reference_id":"RHSA-2023:5604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6254-1/","reference_id":"USN-6254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6254-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3161"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jure-kwde-eufu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78874?format=json","vulnerability_id":"VCID-ke38-q17b-13hz","summary":"kernel: memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45887.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45887.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45887","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01844","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01862","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01858","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01876","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01863","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01847","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01527","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01615","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01623","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0162","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0164","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05681","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06012","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45887"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45887","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45887"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/","reference_id":"20221115131822.6640-1-imv4bel%40gmail.com","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/"}],"url":"https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/"},{"reference_url":"https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel%40gmail.com/","reference_id":"20221115131822.6640-5-imv4bel%40gmail.com","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/"}],"url":"https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel%40gmail.com/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2148520","reference_id":"2148520","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2148520"},{"reference_url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=517a281338322ff8293f988771c98aaa7205e457","reference_id":"?id=517a281338322ff8293f988771c98aaa7205e457","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/"}],"url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=517a281338322ff8293f988771c98aaa7205e457"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230113-0006/","reference_id":"ntap-20230113-0006","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230113-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/6412-1/","reference_id":"USN-6412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6412-1/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45887"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ke38-q17b-13hz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78852?format=json","vulnerability_id":"VCID-ks9z-m9jz-tybr","summary":"kernel: KVM: x86/mmu: race condition in direct_page_fault()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45869.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45869.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45869","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04969","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04826","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.049","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04913","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04917","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05205","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05188","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05174","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05121","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05125","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05139","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05165","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05218","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45869"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151317","reference_id":"2151317","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151317"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15","reference_id":"?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T18:57:15Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4377","reference_id":"RHSA-2023:4377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4378","reference_id":"RHSA-2023:4378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/5911-1/","reference_id":"USN-5911-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5911-1/"},{"reference_url":"https://usn.ubuntu.com/5912-1/","reference_id":"USN-5912-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5912-1/"},{"reference_url":"https://usn.ubuntu.com/5929-1/","reference_id":"USN-5929-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5929-1/"},{"reference_url":"https://usn.ubuntu.com/5935-1/","reference_id":"USN-5935-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5935-1/"},{"reference_url":"https://usn.ubuntu.com/5938-1/","reference_id":"USN-5938-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5938-1/"},{"reference_url":"https://usn.ubuntu.com/5941-1/","reference_id":"USN-5941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5941-1/"},{"reference_url":"https://usn.ubuntu.com/5950-1/","reference_id":"USN-5950-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5950-1/"},{"reference_url":"https://usn.ubuntu.com/5962-1/","reference_id":"USN-5962-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5962-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45869"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ks9z-m9jz-tybr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78259?format=json","vulnerability_id":"VCID-kz9r-zumw-5ydf","summary":"kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3609.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3609.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3609","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02121","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02133","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02132","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0215","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02127","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02112","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02108","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02084","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02097","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02185","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02153","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02144","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02168","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02125","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02137","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc","reference_id":"04c55383fa5689357bcdd2c8036725a55ed632bc","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225201","reference_id":"2225201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225201"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc","reference_id":"commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc"},{"reference_url":"https://www.debian.org/security/2023/dsa-5480","reference_id":"dsa-5480","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"https://www.debian.org/security/2023/dsa-5480"},{"reference_url":"http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0098-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html"},{"reference_url":"http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0099-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230818-0005/","reference_id":"ntap-20230818-0005","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230818-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5574","reference_id":"RHSA-2023:5574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5621","reference_id":"RHSA-2023:5621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5622","reference_id":"RHSA-2023:5622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5628","reference_id":"RHSA-2023:5628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5775","reference_id":"RHSA-2023:5775","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5794","reference_id":"RHSA-2023:5794","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5794"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6799","reference_id":"RHSA-2023:6799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6813","reference_id":"RHSA-2023:6813","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6813"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7294","reference_id":"RHSA-2023:7294","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7294"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7398","reference_id":"RHSA-2023:7398","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7398"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7410","reference_id":"RHSA-2023:7410","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7410"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7417","reference_id":"RHSA-2023:7417","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7417"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7418","reference_id":"RHSA-2023:7418","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7431","reference_id":"RHSA-2023:7431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7434","reference_id":"RHSA-2023:7434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7558","reference_id":"RHSA-2023:7558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0999","reference_id":"RHSA-2024:0999","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1253","reference_id":"RHSA-2024:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://usn.ubuntu.com/6285-1/","reference_id":"USN-6285-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6285-1/"},{"reference_url":"https://usn.ubuntu.com/6315-1/","reference_id":"USN-6315-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6315-1/"},{"reference_url":"https://usn.ubuntu.com/6317-1/","reference_id":"USN-6317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6317-1/"},{"reference_url":"https://usn.ubuntu.com/6318-1/","reference_id":"USN-6318-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6318-1/"},{"reference_url":"https://usn.ubuntu.com/6321-1/","reference_id":"USN-6321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6321-1/"},{"reference_url":"https://usn.ubuntu.com/6324-1/","reference_id":"USN-6324-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6324-1/"},{"reference_url":"https://usn.ubuntu.com/6325-1/","reference_id":"USN-6325-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6325-1/"},{"reference_url":"https://usn.ubuntu.com/6328-1/","reference_id":"USN-6328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6328-1/"},{"reference_url":"https://usn.ubuntu.com/6329-1/","reference_id":"USN-6329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6329-1/"},{"reference_url":"https://usn.ubuntu.com/6330-1/","reference_id":"USN-6330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6330-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6346-1/","reference_id":"USN-6346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6346-1/"},{"reference_url":"https://usn.ubuntu.com/6348-1/","reference_id":"USN-6348-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6348-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3609"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kz9r-zumw-5ydf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78238?format=json","vulnerability_id":"VCID-n89e-y6eu-4ucf","summary":"kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4128.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4128.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2261965","reference_id":"2261965","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2261965"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5235","reference_id":"RHSA-2023:5235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5238","reference_id":"RHSA-2023:5238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5548","reference_id":"RHSA-2023:5548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5575","reference_id":"RHSA-2023:5575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5580","reference_id":"RHSA-2023:5580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5588","reference_id":"RHSA-2023:5588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5589","reference_id":"RHSA-2023:5589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5603","reference_id":"RHSA-2023:5603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5604","reference_id":"RHSA-2023:5604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5627","reference_id":"RHSA-2023:5627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5628","reference_id":"RHSA-2023:5628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5775","reference_id":"RHSA-2023:5775","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5794","reference_id":"RHSA-2023:5794","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5794"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7418","reference_id":"RHSA-2023:7418","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7419","reference_id":"RHSA-2023:7419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7558","reference_id":"RHSA-2023:7558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0261","reference_id":"RHSA-2024:0261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0262","reference_id":"RHSA-2024:0262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0262"},{"reference_url":"https://usn.ubuntu.com/6343-1/","reference_id":"USN-6343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6343-1/"},{"reference_url":"https://usn.ubuntu.com/6383-1/","reference_id":"USN-6383-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6383-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6386-1/","reference_id":"USN-6386-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6386-1/"},{"reference_url":"https://usn.ubuntu.com/6386-2/","reference_id":"USN-6386-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6386-2/"},{"reference_url":"https://usn.ubuntu.com/6386-3/","reference_id":"USN-6386-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6386-3/"},{"reference_url":"https://usn.ubuntu.com/6387-1/","reference_id":"USN-6387-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6387-1/"},{"reference_url":"https://usn.ubuntu.com/6387-2/","reference_id":"USN-6387-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6387-2/"},{"reference_url":"https://usn.ubuntu.com/6388-1/","reference_id":"USN-6388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6388-1/"},{"reference_url":"https://usn.ubuntu.com/6396-1/","reference_id":"USN-6396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-1/"},{"reference_url":"https://usn.ubuntu.com/6396-2/","reference_id":"USN-6396-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-2/"},{"reference_url":"https://usn.ubuntu.com/6396-3/","reference_id":"USN-6396-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-3/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2023-4128"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n89e-y6eu-4ucf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78256?format=json","vulnerability_id":"VCID-netb-fxrv-zyft","summary":"kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3772.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3772.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3772","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01293","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01297","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01457","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01467","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01461","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01462","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0145","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01465","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01669","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0168","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01676","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01568","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0146","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3772"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218943","reference_id":"2218943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://usn.ubuntu.com/6415-1/","reference_id":"USN-6415-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6415-1/"},{"reference_url":"https://usn.ubuntu.com/6439-1/","reference_id":"USN-6439-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6439-1/"},{"reference_url":"https://usn.ubuntu.com/6439-2/","reference_id":"USN-6439-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6439-2/"},{"reference_url":"https://usn.ubuntu.com/6440-1/","reference_id":"USN-6440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-1/"},{"reference_url":"https://usn.ubuntu.com/6440-2/","reference_id":"USN-6440-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-2/"},{"reference_url":"https://usn.ubuntu.com/6440-3/","reference_id":"USN-6440-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-3/"},{"reference_url":"https://usn.ubuntu.com/6462-1/","reference_id":"USN-6462-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6462-1/"},{"reference_url":"https://usn.ubuntu.com/6462-2/","reference_id":"USN-6462-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6462-2/"},{"reference_url":"https://usn.ubuntu.com/6464-1/","reference_id":"USN-6464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6464-1/"},{"reference_url":"https://usn.ubuntu.com/6465-1/","reference_id":"USN-6465-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6465-1/"},{"reference_url":"https://usn.ubuntu.com/6465-2/","reference_id":"USN-6465-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6465-2/"},{"reference_url":"https://usn.ubuntu.com/6465-3/","reference_id":"USN-6465-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6465-3/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"},{"reference_url":"https://usn.ubuntu.com/6516-1/","reference_id":"USN-6516-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6516-1/"},{"reference_url":"https://usn.ubuntu.com/6520-1/","reference_id":"USN-6520-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6520-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3772"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-netb-fxrv-zyft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78471?format=json","vulnerability_id":"VCID-pyu4-rsap-2fhx","summary":"kernel: out-of-bounds access in relay_file_read","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3268.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3268.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3268","reference_id":"","reference_type":"","scores":[{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00622","published_at":"2026-04-02T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00615","published_at":"2026-04-04T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.0061","published_at":"2026-04-09T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00616","published_at":"2026-04-08T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00618","published_at":"2026-04-07T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00609","published_at":"2026-04-11T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00739","published_at":"2026-05-05T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00689","published_at":"2026-04-18T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00688","published_at":"2026-04-13T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00682","published_at":"2026-04-16T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0073","published_at":"2026-04-21T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00732","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215502","reference_id":"2215502","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215502"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2","reference_id":"ChangeLog-6.3.2","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2"},{"reference_url":"https://www.debian.org/security/2023/dsa-5448","reference_id":"dsa-5448","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://www.debian.org/security/2023/dsa-5448"},{"reference_url":"https://www.debian.org/security/2023/dsa-5480","reference_id":"dsa-5480","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://www.debian.org/security/2023/dsa-5480"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1","reference_id":"?id=43ec16f1450f4936025a9bdf1a273affdb9732c1","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230824-0006/","reference_id":"ntap-20230824-0006","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230824-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/","reference_id":"T","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/"}],"url":"https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/"},{"reference_url":"https://usn.ubuntu.com/6252-1/","reference_id":"USN-6252-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6252-1/"},{"reference_url":"https://usn.ubuntu.com/6254-1/","reference_id":"USN-6254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6254-1/"},{"reference_url":"https://usn.ubuntu.com/6283-1/","reference_id":"USN-6283-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6283-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6340-1/","reference_id":"USN-6340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-1/"},{"reference_url":"https://usn.ubuntu.com/6340-2/","reference_id":"USN-6340-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-2/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6349-1/","reference_id":"USN-6349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6349-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3268"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pyu4-rsap-2fhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78522?format=json","vulnerability_id":"VCID-qe58-bb5y-u7ax","summary":"kernel: Spectre v2 SMT mitigations problem","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1998.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1998.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1998","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14543","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14487","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16171","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16311","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16257","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16321","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16263","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16195","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2235","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22515","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22361","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24036","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.23953","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1998"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187257","reference_id":"2187257","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187257"},{"reference_url":"https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d","reference_id":"#6921ed9049bc7457f66c1596c5b78aec0dae4a9d","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/"}],"url":"https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d"},{"reference_url":"https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d","reference_id":"6921ed9049bc7457f66c1596c5b78aec0dae4a9d","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/"}],"url":"https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/51384.txt","reference_id":"CVE-2023-1998","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/51384.txt"},{"reference_url":"https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx","reference_id":"GHSA-mj4w-6495-6crx","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/"}],"url":"https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4377","reference_id":"RHSA-2023:4377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4378","reference_id":"RHSA-2023:4378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5603","reference_id":"RHSA-2023:5603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5604","reference_id":"RHSA-2023:5604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3810","reference_id":"RHSA-2024:3810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3810"},{"reference_url":"https://usn.ubuntu.com/6033-1/","reference_id":"USN-6033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6033-1/"},{"reference_url":"https://usn.ubuntu.com/6171-1/","reference_id":"USN-6171-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6171-1/"},{"reference_url":"https://usn.ubuntu.com/6172-1/","reference_id":"USN-6172-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6172-1/"},{"reference_url":"https://usn.ubuntu.com/6185-1/","reference_id":"USN-6185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6185-1/"},{"reference_url":"https://usn.ubuntu.com/6187-1/","reference_id":"USN-6187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6187-1/"},{"reference_url":"https://usn.ubuntu.com/6207-1/","reference_id":"USN-6207-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6207-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6223-1/","reference_id":"USN-6223-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6223-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"},{"reference_url":"https://usn.ubuntu.com/6739-1/","reference_id":"USN-6739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6739-1/"},{"reference_url":"https://usn.ubuntu.com/6740-1/","reference_id":"USN-6740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6740-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1998"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qe58-bb5y-u7ax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78780?format=json","vulnerability_id":"VCID-qx5q-yc33-huhs","summary":"Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23455.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23455.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23455","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07426","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07321","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0728","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07288","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07259","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07271","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08298","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0836","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08447","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08282","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/01/10/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/01/10/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168332","reference_id":"2168332","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168332"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/01/10/4","reference_id":"4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/01/10/4"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://www.debian.org/security/2023/dsa-5324","reference_id":"dsa-5324","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/"}],"url":"https://www.debian.org/security/2023/dsa-5324"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b","reference_id":"?id=a2965c7be0522eaa18808684b7b82b248515511b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5915-1/","reference_id":"USN-5915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5915-1/"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/5981-1/","reference_id":"USN-5981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5981-1/"},{"reference_url":"https://usn.ubuntu.com/5982-1/","reference_id":"USN-5982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5982-1/"},{"reference_url":"https://usn.ubuntu.com/5984-1/","reference_id":"USN-5984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5984-1/"},{"reference_url":"https://usn.ubuntu.com/5987-1/","reference_id":"USN-5987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5987-1/"},{"reference_url":"https://usn.ubuntu.com/5991-1/","reference_id":"USN-5991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5991-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6004-1/","reference_id":"USN-6004-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6004-1/"},{"reference_url":"https://usn.ubuntu.com/6009-1/","reference_id":"USN-6009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6009-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6071-1/","reference_id":"USN-6071-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6071-1/"},{"reference_url":"https://usn.ubuntu.com/6072-1/","reference_id":"USN-6072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6072-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"}],"fixed_packages":[],"aliases":["CVE-2023-23455"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qx5q-yc33-huhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78561?format=json","vulnerability_id":"VCID-r51v-h1rb-qqdr","summary":"kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33203.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33203.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33203","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04435","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04695","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0448","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04449","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04458","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04595","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04636","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0467","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04696","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04659","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04461","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04473","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04507","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04523","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04512","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04497","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2192667","reference_id":"2192667","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2192667"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9","reference_id":"ChangeLog-6.2.9","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75","reference_id":"?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1210685","reference_id":"show_bug.cgi?id=1210685","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1210685"},{"reference_url":"https://usn.ubuntu.com/6175-1/","reference_id":"USN-6175-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6175-1/"},{"reference_url":"https://usn.ubuntu.com/6186-1/","reference_id":"USN-6186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6186-1/"},{"reference_url":"https://usn.ubuntu.com/6284-1/","reference_id":"USN-6284-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6284-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6301-1/","reference_id":"USN-6301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6301-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6312-1/","reference_id":"USN-6312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6312-1/"},{"reference_url":"https://usn.ubuntu.com/6314-1/","reference_id":"USN-6314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6314-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6337-1/","reference_id":"USN-6337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6337-1/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"}],"fixed_packages":[],"aliases":["CVE-2023-33203"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r51v-h1rb-qqdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78609?format=json","vulnerability_id":"VCID-renx-7s4p-puaa","summary":"kernel: Use after free bug in r592_remove","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3141.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3141.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3141","reference_id":"","reference_type":"","scores":[{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00718","published_at":"2026-04-02T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00824","published_at":"2026-05-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00715","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00792","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00791","published_at":"2026-04-08T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00787","published_at":"2026-04-09T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00781","published_at":"2026-04-18T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00775","published_at":"2026-04-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00777","published_at":"2026-04-16T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00825","published_at":"2026-04-29T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00828","published_at":"2026-04-24T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00829","published_at":"2026-04-26T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00826","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213199","reference_id":"2213199","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213199"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4","reference_id":"ChangeLog-6.3.4","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7","reference_id":"?id=63264422785021704c39b38f65a78ab9e4a186d7","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230706-0004/","reference_id":"ntap-20230706-0004","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230706-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com/t/","reference_id":"t","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/"}],"url":"https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com/t/"},{"reference_url":"https://usn.ubuntu.com/6231-1/","reference_id":"USN-6231-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6231-1/"},{"reference_url":"https://usn.ubuntu.com/6252-1/","reference_id":"USN-6252-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6252-1/"},{"reference_url":"https://usn.ubuntu.com/6254-1/","reference_id":"USN-6254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6254-1/"},{"reference_url":"https://usn.ubuntu.com/6260-1/","reference_id":"USN-6260-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6260-1/"},{"reference_url":"https://usn.ubuntu.com/6283-1/","reference_id":"USN-6283-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6283-1/"},{"reference_url":"https://usn.ubuntu.com/6284-1/","reference_id":"USN-6284-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6284-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6301-1/","reference_id":"USN-6301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6301-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6312-1/","reference_id":"USN-6312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6312-1/"},{"reference_url":"https://usn.ubuntu.com/6314-1/","reference_id":"USN-6314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6314-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6337-1/","reference_id":"USN-6337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6337-1/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3141"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-renx-7s4p-puaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78678?format=json","vulnerability_id":"VCID-ryhg-z4qf-kyd6","summary":"kernel: hid: Use After Free in asus_remove()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1079.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1079.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1079","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04248","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04312","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04269","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04281","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04328","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04306","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05537","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05571","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05607","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05614","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0537","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06458","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173444","reference_id":"2173444","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173444"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df","reference_id":"?id=4ab3a086d10eeec1424f2e8a968827a6336203df","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T21:35:53Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T21:35:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T21:35:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://usn.ubuntu.com/6033-1/","reference_id":"USN-6033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6033-1/"},{"reference_url":"https://usn.ubuntu.com/6171-1/","reference_id":"USN-6171-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6171-1/"},{"reference_url":"https://usn.ubuntu.com/6172-1/","reference_id":"USN-6172-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6172-1/"},{"reference_url":"https://usn.ubuntu.com/6185-1/","reference_id":"USN-6185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6185-1/"},{"reference_url":"https://usn.ubuntu.com/6187-1/","reference_id":"USN-6187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6187-1/"},{"reference_url":"https://usn.ubuntu.com/6207-1/","reference_id":"USN-6207-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6207-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6223-1/","reference_id":"USN-6223-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6223-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"},{"reference_url":"https://usn.ubuntu.com/6604-1/","reference_id":"USN-6604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6604-1/"},{"reference_url":"https://usn.ubuntu.com/6604-2/","reference_id":"USN-6604-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6604-2/"}],"fixed_packages":[],"aliases":["CVE-2023-1079"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ryhg-z4qf-kyd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78700?format=json","vulnerability_id":"VCID-s4uv-qjv6-n7b8","summary":"kernel: net/tls: tls_is_tx_ready() checked list_entry","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1075.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1075.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1075","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01207","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01126","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01211","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01213","published_at":"2026-05-05T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00857","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00851","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00852","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00867","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0087","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00868","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00863","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00864","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1075"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173434","reference_id":"2173434","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173434"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb","reference_id":"?id=ffe2a22562444720b05bdfeb999c03e810d84cbb","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-24T17:05:50Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5978-1/","reference_id":"USN-5978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5978-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6080-1/","reference_id":"USN-6080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6080-1/"},{"reference_url":"https://usn.ubuntu.com/6085-1/","reference_id":"USN-6085-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6085-1/"},{"reference_url":"https://usn.ubuntu.com/6090-1/","reference_id":"USN-6090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6090-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6094-1/","reference_id":"USN-6094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6094-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6109-1/","reference_id":"USN-6109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6109-1/"},{"reference_url":"https://usn.ubuntu.com/6118-1/","reference_id":"USN-6118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6118-1/"},{"reference_url":"https://usn.ubuntu.com/6132-1/","reference_id":"USN-6132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6132-1/"},{"reference_url":"https://usn.ubuntu.com/6133-1/","reference_id":"USN-6133-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6133-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1075"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s4uv-qjv6-n7b8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78679?format=json","vulnerability_id":"VCID-sa68-r3bd-jkcs","summary":"kernel: use-after-free in drivers/media/rc/ene_ir.c due to race condition","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1118.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1118.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1118","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04279","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0431","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04326","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04318","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04253","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04262","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04389","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04408","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04429","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04469","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0447","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04499","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1118"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2174400","reference_id":"2174400","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2174400"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1653","reference_id":"RHSA-2024:1653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3810","reference_id":"RHSA-2024:3810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3810"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6031-1/","reference_id":"USN-6031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6031-1/"},{"reference_url":"https://usn.ubuntu.com/6032-1/","reference_id":"USN-6032-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6032-1/"},{"reference_url":"https://usn.ubuntu.com/6033-1/","reference_id":"USN-6033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6033-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6080-1/","reference_id":"USN-6080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6080-1/"},{"reference_url":"https://usn.ubuntu.com/6081-1/","reference_id":"USN-6081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6081-1/"},{"reference_url":"https://usn.ubuntu.com/6084-1/","reference_id":"USN-6084-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6084-1/"},{"reference_url":"https://usn.ubuntu.com/6085-1/","reference_id":"USN-6085-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6085-1/"},{"reference_url":"https://usn.ubuntu.com/6090-1/","reference_id":"USN-6090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6090-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6092-1/","reference_id":"USN-6092-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6092-1/"},{"reference_url":"https://usn.ubuntu.com/6094-1/","reference_id":"USN-6094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6094-1/"},{"reference_url":"https://usn.ubuntu.com/6095-1/","reference_id":"USN-6095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6095-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6109-1/","reference_id":"USN-6109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6109-1/"},{"reference_url":"https://usn.ubuntu.com/6118-1/","reference_id":"USN-6118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6118-1/"},{"reference_url":"https://usn.ubuntu.com/6132-1/","reference_id":"USN-6132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6132-1/"},{"reference_url":"https://usn.ubuntu.com/6133-1/","reference_id":"USN-6133-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6133-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1118"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sa68-r3bd-jkcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78556?format=json","vulnerability_id":"VCID-ss41-s8fw-xub6","summary":"kernel: lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28772.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28772.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28772","reference_id":"","reference_type":"","scores":[{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39337","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39361","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39275","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39331","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44005","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44053","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44021","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46473","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46617","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46615","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46561","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46543","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46554","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46503","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46408","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28772"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2181330","reference_id":"2181330","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2181330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"}],"fixed_packages":[],"aliases":["CVE-2023-28772"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ss41-s8fw-xub6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78980?format=json","vulnerability_id":"VCID-t81u-wyws-r7c3","summary":"kernel: Rate limit overflow messages in r8152 in intr_callback","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3594.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3594","reference_id":"","reference_type":"","scores":[{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41795","published_at":"2026-05-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42103","published_at":"2026-04-04T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4204","published_at":"2026-04-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42092","published_at":"2026-04-08T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42127","published_at":"2026-04-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42089","published_at":"2026-04-18T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42064","published_at":"2026-04-13T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42115","published_at":"2026-04-16T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42018","published_at":"2026-04-21T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41958","published_at":"2026-04-24T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41952","published_at":"2026-04-26T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41869","published_at":"2026-04-29T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41728","published_at":"2026-05-05T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42075","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2149024","reference_id":"2149024","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2149024"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://vuldb.com/?id.211363","reference_id":"?id.211363","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/"}],"url":"https://vuldb.com/?id.211363"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907","reference_id":"?id=93e2be344a7db169b7119de21ac1bf253b8c6907","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/5754-1/","reference_id":"USN-5754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-1/"},{"reference_url":"https://usn.ubuntu.com/5754-2/","reference_id":"USN-5754-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-2/"},{"reference_url":"https://usn.ubuntu.com/5755-1/","reference_id":"USN-5755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-1/"},{"reference_url":"https://usn.ubuntu.com/5755-2/","reference_id":"USN-5755-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-2/"},{"reference_url":"https://usn.ubuntu.com/5756-1/","reference_id":"USN-5756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-1/"},{"reference_url":"https://usn.ubuntu.com/5756-2/","reference_id":"USN-5756-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-2/"},{"reference_url":"https://usn.ubuntu.com/5756-3/","reference_id":"USN-5756-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-3/"},{"reference_url":"https://usn.ubuntu.com/5757-1/","reference_id":"USN-5757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-1/"},{"reference_url":"https://usn.ubuntu.com/5757-2/","reference_id":"USN-5757-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-2/"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5773-1/","reference_id":"USN-5773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5773-1/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"},{"reference_url":"https://usn.ubuntu.com/5779-1/","reference_id":"USN-5779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5779-1/"},{"reference_url":"https://usn.ubuntu.com/5789-1/","reference_id":"USN-5789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5789-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3594"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t81u-wyws-r7c3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4357?format=json","vulnerability_id":"VCID-trxm-8mg3-4bbr","summary":"x86/Intel: Gather Data Sampling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40982.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40982.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-40982","reference_id":"","reference_type":"","scores":[{"value":"0.00733","scoring_system":"epss","scoring_elements":"0.72829","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00733","scoring_system":"epss","scoring_elements":"0.72799","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.7488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74883","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74916","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74952","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.7493","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74957","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.75003","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-40982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305","reference_id":"1043305","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223949","reference_id":"2223949","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223949"},{"reference_url":"https://access.redhat.com/solutions/7027704","reference_id":"7027704","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://access.redhat.com/solutions/7027704"},{"reference_url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-007/","reference_id":"AWS-2023-007","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-007/"},{"reference_url":"https://downfall.page","reference_id":"downfall.page","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://downfall.page"},{"reference_url":"https://www.debian.org/security/2023/dsa-5474","reference_id":"dsa-5474","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://www.debian.org/security/2023/dsa-5474"},{"reference_url":"https://www.debian.org/security/2023/dsa-5475","reference_id":"dsa-5475","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://www.debian.org/security/2023/dsa-5475"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/","reference_id":"HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/","reference_id":"HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"},{"reference_url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html","reference_id":"intel-sa-00828.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html","reference_id":"msg00013.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230811-0001/","reference_id":"ntap-20230811-0001","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230811-0001/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/","reference_id":"OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0562","reference_id":"RHSA-2024:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0563","reference_id":"RHSA-2024:0563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3319","reference_id":"RHSA-2024:3319","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3319"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/","reference_id":"T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/"},{"reference_url":"https://usn.ubuntu.com/6286-1/","reference_id":"USN-6286-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6286-1/"},{"reference_url":"https://usn.ubuntu.com/6315-1/","reference_id":"USN-6315-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6315-1/"},{"reference_url":"https://usn.ubuntu.com/6316-1/","reference_id":"USN-6316-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6316-1/"},{"reference_url":"https://usn.ubuntu.com/6317-1/","reference_id":"USN-6317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6317-1/"},{"reference_url":"https://usn.ubuntu.com/6318-1/","reference_id":"USN-6318-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6318-1/"},{"reference_url":"https://usn.ubuntu.com/6321-1/","reference_id":"USN-6321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6321-1/"},{"reference_url":"https://usn.ubuntu.com/6324-1/","reference_id":"USN-6324-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6324-1/"},{"reference_url":"https://usn.ubuntu.com/6325-1/","reference_id":"USN-6325-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6325-1/"},{"reference_url":"https://usn.ubuntu.com/6328-1/","reference_id":"USN-6328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6328-1/"},{"reference_url":"https://usn.ubuntu.com/6329-1/","reference_id":"USN-6329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6329-1/"},{"reference_url":"https://usn.ubuntu.com/6330-1/","reference_id":"USN-6330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6330-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6346-1/","reference_id":"USN-6346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6346-1/"},{"reference_url":"https://usn.ubuntu.com/6348-1/","reference_id":"USN-6348-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6348-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6388-1/","reference_id":"USN-6388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6388-1/"},{"reference_url":"https://usn.ubuntu.com/6396-1/","reference_id":"USN-6396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-1/"},{"reference_url":"https://usn.ubuntu.com/6396-2/","reference_id":"USN-6396-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-2/"},{"reference_url":"https://usn.ubuntu.com/6396-3/","reference_id":"USN-6396-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-3/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-435.html","reference_id":"XSA-435","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://xenbits.xen.org/xsa/advisory-435.html"}],"fixed_packages":[],"aliases":["CVE-2022-40982","XSA-435"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-trxm-8mg3-4bbr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78236?format=json","vulnerability_id":"VCID-ubr3-74hm-e7hy","summary":"kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4207.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4207","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07459","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07309","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08541","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08535","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08414","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08574","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13118","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13198","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13402","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13279","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1333","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13298","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1326","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4207"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225511","reference_id":"2225511","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7418","reference_id":"RHSA-2023:7418","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7419","reference_id":"RHSA-2023:7419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7558","reference_id":"RHSA-2023:7558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0261","reference_id":"RHSA-2024:0261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0262","reference_id":"RHSA-2024:0262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0262"}],"fixed_packages":[],"aliases":["CVE-2023-4207"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ubr3-74hm-e7hy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78682?format=json","vulnerability_id":"VCID-uc3a-36wc-n3bt","summary":"kernel: smsusb: use-after-free caused by do_submit_urb()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4132.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4132.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4132","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01447","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01433","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01534","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01542","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01549","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0154","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01449","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01456","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0145","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01443","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01444","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03593","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03516","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03574","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221707","reference_id":"2221707","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221707"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:8::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:8::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.6::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_id":"cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-4132","reference_id":"CVE-2023-4132","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-4132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/6416-1/","reference_id":"USN-6416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-1/"},{"reference_url":"https://usn.ubuntu.com/6416-2/","reference_id":"USN-6416-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-2/"},{"reference_url":"https://usn.ubuntu.com/6416-3/","reference_id":"USN-6416-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-3/"},{"reference_url":"https://usn.ubuntu.com/6445-1/","reference_id":"USN-6445-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-1/"},{"reference_url":"https://usn.ubuntu.com/6445-2/","reference_id":"USN-6445-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-2/"},{"reference_url":"https://usn.ubuntu.com/6462-1/","reference_id":"USN-6462-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6462-1/"},{"reference_url":"https://usn.ubuntu.com/6462-2/","reference_id":"USN-6462-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6462-2/"},{"reference_url":"https://usn.ubuntu.com/6464-1/","reference_id":"USN-6464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6464-1/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"},{"reference_url":"https://usn.ubuntu.com/6520-1/","reference_id":"USN-6520-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6520-1/"},{"reference_url":"https://usn.ubuntu.com/6701-1/","reference_id":"USN-6701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-1/"},{"reference_url":"https://usn.ubuntu.com/6701-2/","reference_id":"USN-6701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-2/"},{"reference_url":"https://usn.ubuntu.com/6701-3/","reference_id":"USN-6701-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-3/"},{"reference_url":"https://usn.ubuntu.com/6701-4/","reference_id":"USN-6701-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-4/"}],"fixed_packages":[],"aliases":["CVE-2023-4132"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uc3a-36wc-n3bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78758?format=json","vulnerability_id":"VCID-uhue-acky-4ye7","summary":"kernel: HID: check empty report_list in hid_validate_values()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1073.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1073.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1073","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04954","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0499","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05009","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05031","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04976","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04998","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06226","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05886","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05897","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06048","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0607","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.061","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06106","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06126","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/05/2","reference_id":"2","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/05/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173403","reference_id":"2173403","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173403"},{"reference_url":"https://www.openwall.com/lists/osssecurity/2023/01/17/3","reference_id":"3","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"}],"url":"https://www.openwall.com/lists/osssecurity/2023/01/17/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/05/3","reference_id":"3","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/05/3"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456","reference_id":"id=b12fece4c64857e5fab4290bf01b2e0317a88456","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0881","reference_id":"RHSA-2024:0881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0897","reference_id":"RHSA-2024:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0897"},{"reference_url":"https://usn.ubuntu.com/5978-1/","reference_id":"USN-5978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5978-1/"},{"reference_url":"https://usn.ubuntu.com/6025-1/","reference_id":"USN-6025-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6025-1/"},{"reference_url":"https://usn.ubuntu.com/6027-1/","reference_id":"USN-6027-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6027-1/"},{"reference_url":"https://usn.ubuntu.com/6029-1/","reference_id":"USN-6029-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6029-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6040-1/","reference_id":"USN-6040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6040-1/"},{"reference_url":"https://usn.ubuntu.com/6057-1/","reference_id":"USN-6057-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6057-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6093-1/","reference_id":"USN-6093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6093-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6149-1/","reference_id":"USN-6149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6149-1/"},{"reference_url":"https://usn.ubuntu.com/6174-1/","reference_id":"USN-6174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6174-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6235-1/","reference_id":"USN-6235-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6235-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1073"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uhue-acky-4ye7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78338?format=json","vulnerability_id":"VCID-uswu-w3g7-9ybk","summary":"kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35824.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35824.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-35824","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01134","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01055","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01064","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01128","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01133","published_at":"2026-05-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00933","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00945","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00949","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00953","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00937","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00934","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-35824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35824"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/lkml/20230318081506.795147-1-zyytlz.wz%40163.com/","reference_id":"20230318081506.795147-1-zyytlz.wz%40163.com","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/"}],"url":"https://lore.kernel.org/lkml/20230318081506.795147-1-zyytlz.wz%40163.com/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215836","reference_id":"2215836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215836"},{"reference_url":"https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/","reference_id":"49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/"}],"url":"https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2","reference_id":"ChangeLog-6.3.2","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a","reference_id":"?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230803-0002/","reference_id":"ntap-20230803-0002","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230803-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://usn.ubuntu.com/6283-1/","reference_id":"USN-6283-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6283-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6340-1/","reference_id":"USN-6340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-1/"},{"reference_url":"https://usn.ubuntu.com/6340-2/","reference_id":"USN-6340-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-2/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6349-1/","reference_id":"USN-6349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6349-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-35824"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uswu-w3g7-9ybk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78945?format=json","vulnerability_id":"VCID-wm98-kp5f-mudg","summary":"kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3640.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3640","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06705","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07946","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07932","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0809","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08007","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07981","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0795","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08252","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08217","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08281","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.083","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08291","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08271","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2139610","reference_id":"2139610","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2139610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1877","reference_id":"RHSA-2024:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2621","reference_id":"RHSA-2024:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22910","reference_id":"RHSA-2025:22910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22914","reference_id":"RHSA-2025:22914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22914"},{"reference_url":"https://usn.ubuntu.com/5850-1/","reference_id":"USN-5850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5850-1/"},{"reference_url":"https://usn.ubuntu.com/5851-1/","reference_id":"USN-5851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5851-1/"},{"reference_url":"https://usn.ubuntu.com/5853-1/","reference_id":"USN-5853-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5853-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5874-1/","reference_id":"USN-5874-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5874-1/"},{"reference_url":"https://usn.ubuntu.com/5875-1/","reference_id":"USN-5875-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5875-1/"},{"reference_url":"https://usn.ubuntu.com/5876-1/","reference_id":"USN-5876-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5876-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5878-1/","reference_id":"USN-5878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5878-1/"},{"reference_url":"https://usn.ubuntu.com/5879-1/","reference_id":"USN-5879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5879-1/"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5909-1/","reference_id":"USN-5909-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5909-1/"},{"reference_url":"https://usn.ubuntu.com/5918-1/","reference_id":"USN-5918-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5918-1/"},{"reference_url":"https://usn.ubuntu.com/5919-1/","reference_id":"USN-5919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5919-1/"},{"reference_url":"https://usn.ubuntu.com/5920-1/","reference_id":"USN-5920-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5920-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5925-1/","reference_id":"USN-5925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5925-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"},{"reference_url":"https://usn.ubuntu.com/7607-1/","reference_id":"USN-7607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7607-1/"},{"reference_url":"https://usn.ubuntu.com/7607-2/","reference_id":"USN-7607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7607-2/"},{"reference_url":"https://usn.ubuntu.com/7607-3/","reference_id":"USN-7607-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7607-3/"}],"fixed_packages":[],"aliases":["CVE-2022-3640"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wm98-kp5f-mudg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79548?format=json","vulnerability_id":"VCID-wxfm-2u2z-euad","summary":"kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28388.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28388.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28388","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01841","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01781","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01794","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01797","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0181","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01803","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01793","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0185","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01846","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01892","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01856","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073091","reference_id":"2073091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073091"},{"reference_url":"https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2","reference_id":"3d3925ff6433f98992685a9679613a2cc97f3ce2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/","reference_id":"6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/"},{"reference_url":"https://security.archlinux.org/AVG-2698","reference_id":"AVG-2698","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2698"},{"reference_url":"https://security.archlinux.org/AVG-2699","reference_id":"AVG-2699","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2699"},{"reference_url":"https://security.archlinux.org/AVG-2700","reference_id":"AVG-2700","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2700"},{"reference_url":"https://security.archlinux.org/AVG-2701","reference_id":"AVG-2701","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2701"},{"reference_url":"https://www.debian.org/security/2022/dsa-5127","reference_id":"dsa-5127","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://www.debian.org/security/2022/dsa-5127"},{"reference_url":"https://www.debian.org/security/2022/dsa-5173","reference_id":"dsa-5173","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://www.debian.org/security/2022/dsa-5173"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/","reference_id":"LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220513-0001/","reference_id":"ntap-20220513-0001","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220513-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/5416-1/","reference_id":"USN-5416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5416-1/"},{"reference_url":"https://usn.ubuntu.com/5469-1/","reference_id":"USN-5469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5469-1/"},{"reference_url":"https://usn.ubuntu.com/5493-1/","reference_id":"USN-5493-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5493-1/"},{"reference_url":"https://usn.ubuntu.com/5493-2/","reference_id":"USN-5493-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5493-2/"},{"reference_url":"https://usn.ubuntu.com/5505-1/","reference_id":"USN-5505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5505-1/"},{"reference_url":"https://usn.ubuntu.com/5513-1/","reference_id":"USN-5513-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5513-1/"},{"reference_url":"https://usn.ubuntu.com/5539-1/","reference_id":"USN-5539-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5539-1/"},{"reference_url":"https://usn.ubuntu.com/5541-1/","reference_id":"USN-5541-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5541-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/","reference_id":"XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/"}],"fixed_packages":[],"aliases":["CVE-2022-28388"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wxfm-2u2z-euad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78505?format=json","vulnerability_id":"VCID-wzfs-19ss-5fav","summary":"kernel: A possible deadlock in dm_get_inactive_table in dm- ioctl.c leads to dos","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2269.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2269.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2269","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06039","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05924","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05933","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05948","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06045","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06451","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06441","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06382","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06392","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06373","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06464","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06421","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06352","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06384","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2189388","reference_id":"2189388","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2189388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://usn.ubuntu.com/6173-1/","reference_id":"USN-6173-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6173-1/"},{"reference_url":"https://usn.ubuntu.com/6283-1/","reference_id":"USN-6283-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6283-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6309-1/","reference_id":"USN-6309-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6309-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6327-1/","reference_id":"USN-6327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6327-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6340-1/","reference_id":"USN-6340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-1/"},{"reference_url":"https://usn.ubuntu.com/6340-2/","reference_id":"USN-6340-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-2/"},{"reference_url":"https://usn.ubuntu.com/6342-1/","reference_id":"USN-6342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6342-1/"},{"reference_url":"https://usn.ubuntu.com/6342-2/","reference_id":"USN-6342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6342-2/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6349-1/","reference_id":"USN-6349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6349-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-2269"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wzfs-19ss-5fav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78235?format=json","vulnerability_id":"VCID-yrxe-ak75-qfhh","summary":"kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4206.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4206","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19431","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19598","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19612","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19493","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19454","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19343","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22931","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22946","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23047","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23091","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2288","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23005","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23024","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22987","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4206"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225511","reference_id":"2225511","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7418","reference_id":"RHSA-2023:7418","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7419","reference_id":"RHSA-2023:7419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7558","reference_id":"RHSA-2023:7558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0261","reference_id":"RHSA-2024:0261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0262","reference_id":"RHSA-2024:0262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0262"}],"fixed_packages":[],"aliases":["CVE-2023-4206"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yrxe-ak75-qfhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78237?format=json","vulnerability_id":"VCID-zbbv-tgna-hybm","summary":"kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4208.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4208","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08446","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0829","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08448","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08418","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08383","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0835","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08303","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1067","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10614","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1048","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10638","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1066","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10524","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10597","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10657","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225511","reference_id":"2225511","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7418","reference_id":"RHSA-2023:7418","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7419","reference_id":"RHSA-2023:7419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7558","reference_id":"RHSA-2023:7558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0261","reference_id":"RHSA-2024:0261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0262","reference_id":"RHSA-2024:0262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0262"}],"fixed_packages":[],"aliases":["CVE-2023-4208"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zbbv-tgna-hybm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78519?format=json","vulnerability_id":"VCID-zuk7-eezk-mufb","summary":"kernel: out-of-bounds write in qfq_change_class function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31436.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31436.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-31436","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10327","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10334","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10186","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10234","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10302","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10308","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11539","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1148","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11322","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11405","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11463","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1147","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11408","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11271","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-31436"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2192671","reference_id":"2192671","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2192671"},{"reference_url":"https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d","reference_id":"3037933448f60f9acb705997eae62013ecb81e0d","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13","reference_id":"ChangeLog-6.2.13","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13"},{"reference_url":"https://www.debian.org/security/2023/dsa-5402","reference_id":"dsa-5402","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"https://www.debian.org/security/2023/dsa-5402"},{"reference_url":"http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0095-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html"},{"reference_url":"http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0096-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html"},{"reference_url":"http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0099-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html"},{"reference_url":"https://www.spinics.net/lists/stable-commits/msg294885.html","reference_id":"msg294885.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"https://www.spinics.net/lists/stable-commits/msg294885.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230609-0001/","reference_id":"ntap-20230609-0001","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230609-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0261","reference_id":"RHSA-2024:0261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0262","reference_id":"RHSA-2024:0262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0262"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0378","reference_id":"RHSA-2024:0378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0554","reference_id":"RHSA-2024:0554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1278","reference_id":"RHSA-2024:1278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1323","reference_id":"RHSA-2024:1323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1367","reference_id":"RHSA-2024:1367","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1367"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1377","reference_id":"RHSA-2024:1377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1377"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1382","reference_id":"RHSA-2024:1382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1831","reference_id":"RHSA-2024:1831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1831"},{"reference_url":"https://usn.ubuntu.com/6127-1/","reference_id":"USN-6127-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6127-1/"},{"reference_url":"https://usn.ubuntu.com/6130-1/","reference_id":"USN-6130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6130-1/"},{"reference_url":"https://usn.ubuntu.com/6131-1/","reference_id":"USN-6131-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6131-1/"},{"reference_url":"https://usn.ubuntu.com/6132-1/","reference_id":"USN-6132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6132-1/"},{"reference_url":"https://usn.ubuntu.com/6135-1/","reference_id":"USN-6135-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6135-1/"},{"reference_url":"https://usn.ubuntu.com/6149-1/","reference_id":"USN-6149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6149-1/"},{"reference_url":"https://usn.ubuntu.com/6150-1/","reference_id":"USN-6150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6150-1/"},{"reference_url":"https://usn.ubuntu.com/6162-1/","reference_id":"USN-6162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6162-1/"},{"reference_url":"https://usn.ubuntu.com/6173-1/","reference_id":"USN-6173-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6173-1/"},{"reference_url":"https://usn.ubuntu.com/6175-1/","reference_id":"USN-6175-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6175-1/"},{"reference_url":"https://usn.ubuntu.com/6186-1/","reference_id":"USN-6186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6186-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6460-1/","reference_id":"USN-6460-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6460-1/"}],"fixed_packages":[],"aliases":["CVE-2023-31436"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zuk7-eezk-mufb"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@4.18.0-513.5.1.rt7.307%3Farch=el8_9"}