{"url":"http://public2.vulnerablecode.io/api/packages/96301?format=json","purl":"pkg:rpm/redhat/kernel-rt@5.14.0-70.64.1.rt21.135?arch=el9_0","type":"rpm","namespace":"redhat","name":"kernel-rt","version":"5.14.0-70.64.1.rt21.135","qualifiers":{"arch":"el9_0"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78893?format=json","vulnerability_id":"VCID-4nqf-ct5y-6uev","summary":"kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42896","reference_id":"","reference_type":"","scores":[{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62045","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62015","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62021","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62003","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.6201","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61955","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62063","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62018","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61916","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61946","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61966","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61983","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62004","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61973","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42896"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2147364","reference_id":"2147364","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2147364"},{"reference_url":"https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4","reference_id":"#711f8c3fb3db61897080468586b970c87c61d9e4","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/"}],"url":"https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4"},{"reference_url":"https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4","reference_id":"711f8c3fb3db61897080468586b970c87c61d9e4","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/"}],"url":"https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3461","reference_id":"RHSA-2023:3461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3462","reference_id":"RHSA-2023:3462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3517","reference_id":"RHSA-2023:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4137","reference_id":"RHSA-2023:4137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4138","reference_id":"RHSA-2023:4138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4230","reference_id":"RHSA-2023:4230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4517","reference_id":"RHSA-2023:4517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4531","reference_id":"RHSA-2023:4531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4541","reference_id":"RHSA-2023:4541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4789","reference_id":"RHSA-2023:4789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4888","reference_id":"RHSA-2023:4888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5580","reference_id":"RHSA-2023:5580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5588","reference_id":"RHSA-2023:5588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5589","reference_id":"RHSA-2023:5589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0980","reference_id":"RHSA-2024:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1249","reference_id":"RHSA-2024:1249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1323","reference_id":"RHSA-2024:1323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1332","reference_id":"RHSA-2024:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1746","reference_id":"RHSA-2024:1746","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1746"},{"reference_url":"https://usn.ubuntu.com/5780-1/","reference_id":"USN-5780-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5780-1/"},{"reference_url":"https://usn.ubuntu.com/5783-1/","reference_id":"USN-5783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5783-1/"},{"reference_url":"https://usn.ubuntu.com/5794-1/","reference_id":"USN-5794-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5794-1/"},{"reference_url":"https://usn.ubuntu.com/5802-1/","reference_id":"USN-5802-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5802-1/"},{"reference_url":"https://usn.ubuntu.com/5803-1/","reference_id":"USN-5803-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5803-1/"},{"reference_url":"https://usn.ubuntu.com/5804-1/","reference_id":"USN-5804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5804-1/"},{"reference_url":"https://usn.ubuntu.com/5804-2/","reference_id":"USN-5804-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5804-2/"},{"reference_url":"https://usn.ubuntu.com/5808-1/","reference_id":"USN-5808-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5808-1/"},{"reference_url":"https://usn.ubuntu.com/5809-1/","reference_id":"USN-5809-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5809-1/"},{"reference_url":"https://usn.ubuntu.com/5813-1/","reference_id":"USN-5813-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5813-1/"},{"reference_url":"https://usn.ubuntu.com/5814-1/","reference_id":"USN-5814-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5814-1/"},{"reference_url":"https://usn.ubuntu.com/5829-1/","reference_id":"USN-5829-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5829-1/"},{"reference_url":"https://usn.ubuntu.com/5830-1/","reference_id":"USN-5830-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5830-1/"},{"reference_url":"https://usn.ubuntu.com/5831-1/","reference_id":"USN-5831-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5831-1/"},{"reference_url":"https://usn.ubuntu.com/5832-1/","reference_id":"USN-5832-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5832-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5861-1/","reference_id":"USN-5861-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5861-1/"},{"reference_url":"https://usn.ubuntu.com/5863-1/","reference_id":"USN-5863-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5863-1/"},{"reference_url":"https://usn.ubuntu.com/5875-1/","reference_id":"USN-5875-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5875-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5879-1/","reference_id":"USN-5879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5879-1/"},{"reference_url":"https://usn.ubuntu.com/5914-1/","reference_id":"USN-5914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5914-1/"},{"reference_url":"https://usn.ubuntu.com/5918-1/","reference_id":"USN-5918-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5918-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42896"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4nqf-ct5y-6uev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79556?format=json","vulnerability_id":"VCID-5pt2-wwc2-zbfy","summary":"kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1016.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1016.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1016","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02384","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02616","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02532","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02596","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02564","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0258","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02618","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02454","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02466","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02467","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0247","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0249","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02461","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02445","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02451","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02556","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02543","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066614","reference_id":"2066614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066614"},{"reference_url":"https://security.archlinux.org/AVG-2698","reference_id":"AVG-2698","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2698"},{"reference_url":"https://security.archlinux.org/AVG-2699","reference_id":"AVG-2699","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2699"},{"reference_url":"https://security.archlinux.org/AVG-2700","reference_id":"AVG-2700","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2700"},{"reference_url":"https://security.archlinux.org/AVG-2701","reference_id":"AVG-2701","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7444","reference_id":"RHSA-2022:7444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7683","reference_id":"RHSA-2022:7683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7933","reference_id":"RHSA-2022:7933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4137","reference_id":"RHSA-2023:4137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4138","reference_id":"RHSA-2023:4138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5381-1/","reference_id":"USN-5381-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5381-1/"},{"reference_url":"https://usn.ubuntu.com/5383-1/","reference_id":"USN-5383-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5383-1/"},{"reference_url":"https://usn.ubuntu.com/5390-1/","reference_id":"USN-5390-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5390-1/"},{"reference_url":"https://usn.ubuntu.com/5390-2/","reference_id":"USN-5390-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5390-2/"},{"reference_url":"https://usn.ubuntu.com/5415-1/","reference_id":"USN-5415-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5415-1/"},{"reference_url":"https://usn.ubuntu.com/5466-1/","reference_id":"USN-5466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5466-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"}],"fixed_packages":[],"aliases":["CVE-2022-1016"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5pt2-wwc2-zbfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78962?format=json","vulnerability_id":"VCID-dqhd-grev-t3ge","summary":"kernel: use-after-free related to leaf anon_vma double reuse","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42703","reference_id":"","reference_type":"","scores":[{"value":"0.0088","scoring_system":"epss","scoring_elements":"0.75486","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0088","scoring_system":"epss","scoring_elements":"0.75473","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0088","scoring_system":"epss","scoring_elements":"0.75498","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0088","scoring_system":"epss","scoring_elements":"0.75478","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76907","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76773","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76783","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76824","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76833","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76827","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76875","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76866","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76906","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76918","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133483","reference_id":"2133483","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133483"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1091","reference_id":"RHSA-2023:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1092","reference_id":"RHSA-2023:1092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3388","reference_id":"RHSA-2023:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4137","reference_id":"RHSA-2023:4137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4138","reference_id":"RHSA-2023:4138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4138"},{"reference_url":"https://usn.ubuntu.com/5728-1/","reference_id":"USN-5728-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-1/"},{"reference_url":"https://usn.ubuntu.com/5728-2/","reference_id":"USN-5728-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-2/"},{"reference_url":"https://usn.ubuntu.com/5728-3/","reference_id":"USN-5728-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-3/"},{"reference_url":"https://usn.ubuntu.com/5755-1/","reference_id":"USN-5755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-1/"},{"reference_url":"https://usn.ubuntu.com/5755-2/","reference_id":"USN-5755-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-2/"},{"reference_url":"https://usn.ubuntu.com/5756-1/","reference_id":"USN-5756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-1/"},{"reference_url":"https://usn.ubuntu.com/5756-2/","reference_id":"USN-5756-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-2/"},{"reference_url":"https://usn.ubuntu.com/5756-3/","reference_id":"USN-5756-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-3/"},{"reference_url":"https://usn.ubuntu.com/5757-1/","reference_id":"USN-5757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-1/"},{"reference_url":"https://usn.ubuntu.com/5757-2/","reference_id":"USN-5757-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-2/"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5773-1/","reference_id":"USN-5773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5773-1/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"},{"reference_url":"https://usn.ubuntu.com/5779-1/","reference_id":"USN-5779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5779-1/"},{"reference_url":"https://usn.ubuntu.com/5789-1/","reference_id":"USN-5789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5789-1/"},{"reference_url":"https://usn.ubuntu.com/5916-1/","reference_id":"USN-5916-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5916-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42703"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqhd-grev-t3ge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78509?format=json","vulnerability_id":"VCID-mdjx-3kwa-r7bj","summary":"Kernel: bluetooth: Unauthorized management command execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2002.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2002.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2002","reference_id":"","reference_type":"","scores":[{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69275","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69292","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69322","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69339","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69361","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69318","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69366","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69457","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69387","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69429","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69463","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69432","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69845","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69897","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69906","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69909","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187308","reference_id":"2187308","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187308"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3708","reference_id":"RHSA-2023:3708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3723","reference_id":"RHSA-2023:3723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4137","reference_id":"RHSA-2023:4137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4138","reference_id":"RHSA-2023:4138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4789","reference_id":"RHSA-2023:4789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4961","reference_id":"RHSA-2023:4961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4962","reference_id":"RHSA-2023:4962","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4962"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5244","reference_id":"RHSA-2023:5244","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5244"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5255","reference_id":"RHSA-2023:5255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1746","reference_id":"RHSA-2024:1746","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1746"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2003","reference_id":"RHSA-2024:2003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2004","reference_id":"RHSA-2024:2004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4098","reference_id":"RHSA-2024:4098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4098"},{"reference_url":"https://usn.ubuntu.com/6173-1/","reference_id":"USN-6173-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6173-1/"},{"reference_url":"https://usn.ubuntu.com/6283-1/","reference_id":"USN-6283-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6283-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6340-1/","reference_id":"USN-6340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-1/"},{"reference_url":"https://usn.ubuntu.com/6340-2/","reference_id":"USN-6340-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-2/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6349-1/","reference_id":"USN-6349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6349-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"},{"reference_url":"https://usn.ubuntu.com/6701-1/","reference_id":"USN-6701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-1/"},{"reference_url":"https://usn.ubuntu.com/6701-2/","reference_id":"USN-6701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-2/"},{"reference_url":"https://usn.ubuntu.com/6701-3/","reference_id":"USN-6701-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-3/"},{"reference_url":"https://usn.ubuntu.com/6701-4/","reference_id":"USN-6701-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6701-4/"}],"fixed_packages":[],"aliases":["CVE-2023-2002"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mdjx-3kwa-r7bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78523?format=json","vulnerability_id":"VCID-t7q4-3b72-u3a5","summary":"kernel: OOB access in the Linux kernel's XFS subsystem","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2124.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2124.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2124","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05705","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05463","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05562","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05611","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05689","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05699","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05562","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05555","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05504","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05513","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0554","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05578","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05574","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05505","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06131","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06163","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06171","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187439","reference_id":"2187439","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3708","reference_id":"RHSA-2023:3708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3723","reference_id":"RHSA-2023:3723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4137","reference_id":"RHSA-2023:4137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4138","reference_id":"RHSA-2023:4138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4515","reference_id":"RHSA-2023:4515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4517","reference_id":"RHSA-2023:4517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4541","reference_id":"RHSA-2023:4541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4789","reference_id":"RHSA-2023:4789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4815","reference_id":"RHSA-2023:4815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4817","reference_id":"RHSA-2023:4817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4961","reference_id":"RHSA-2023:4961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4962","reference_id":"RHSA-2023:4962","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4962"},{"reference_url":"https://usn.ubuntu.com/6206-1/","reference_id":"USN-6206-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6206-1/"},{"reference_url":"https://usn.ubuntu.com/6224-1/","reference_id":"USN-6224-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6224-1/"},{"reference_url":"https://usn.ubuntu.com/6228-1/","reference_id":"USN-6228-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6228-1/"},{"reference_url":"https://usn.ubuntu.com/6231-1/","reference_id":"USN-6231-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6231-1/"},{"reference_url":"https://usn.ubuntu.com/6235-1/","reference_id":"USN-6235-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6235-1/"},{"reference_url":"https://usn.ubuntu.com/6252-1/","reference_id":"USN-6252-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6252-1/"},{"reference_url":"https://usn.ubuntu.com/6254-1/","reference_id":"USN-6254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6254-1/"},{"reference_url":"https://usn.ubuntu.com/6284-1/","reference_id":"USN-6284-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6284-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6301-1/","reference_id":"USN-6301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6301-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6312-1/","reference_id":"USN-6312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6312-1/"},{"reference_url":"https://usn.ubuntu.com/6314-1/","reference_id":"USN-6314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6314-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6337-1/","reference_id":"USN-6337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6337-1/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"}],"fixed_packages":[],"aliases":["CVE-2023-2124"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t7q4-3b72-u3a5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78595?format=json","vulnerability_id":"VCID-zsmq-81fu-q3fq","summary":"kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2235.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2235.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2235","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02509","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02678","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02601","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02589","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02652","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02623","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02639","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02524","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02528","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02549","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02529","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02518","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02504","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02616","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2235"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2192589","reference_id":"2192589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2192589"},{"reference_url":"https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2","reference_id":"fd0815f632c24878e325821943edccc7fde947a2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:38:34Z/"}],"url":"https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2","reference_id":"?id=fd0815f632c24878e325821943edccc7fde947a2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:38:34Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3705","reference_id":"RHSA-2023:3705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3708","reference_id":"RHSA-2023:3708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3723","reference_id":"RHSA-2023:3723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4137","reference_id":"RHSA-2023:4137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4138","reference_id":"RHSA-2023:4138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4517","reference_id":"RHSA-2023:4517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4541","reference_id":"RHSA-2023:4541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5627","reference_id":"RHSA-2023:5627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5627"},{"reference_url":"https://usn.ubuntu.com/6175-1/","reference_id":"USN-6175-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6175-1/"},{"reference_url":"https://usn.ubuntu.com/6186-1/","reference_id":"USN-6186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6186-1/"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"}],"fixed_packages":[],"aliases":["CVE-2023-2235"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zsmq-81fu-q3fq"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-70.64.1.rt21.135%3Farch=el9_0"}