Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/podman@3.4.6-r0?arch=ppc64le&distroversion=v3.15&reponame=community
Typeapk
Namespacealpine
Namepodman
Version3.4.6-r0
Qualifiers
arch ppc64le
distroversion v3.15
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.4.7-r0
Latest_non_vulnerable_version3.4.7-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1n1h-e2p4-9yhs
vulnerability_id VCID-1n1h-e2p4-9yhs
summary
golang.org/x/crypto/ssh Denial of service via crafted Signer
The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27191.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27191.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27191
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25246
published_at 2026-04-21T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25443
published_at 2026-04-02T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25318
published_at 2026-04-08T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.2525
published_at 2026-04-07T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25479
published_at 2026-04-04T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25276
published_at 2026-04-18T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25286
published_at 2026-04-16T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.2528
published_at 2026-04-13T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25333
published_at 2026-04-12T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25374
published_at 2026-04-11T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25363
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27191
2
reference_url https://cs.opensource.google/go/x/crypto
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cs.opensource.google/go/x/crypto
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27191
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27191
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://go.dev/cl/392355
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/392355
6
reference_url https://go.googlesource.com/crypto/+/1baeb1ce4c0b006eff0f294c47cb7617598dfb3d
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.googlesource.com/crypto/+/1baeb1ce4c0b006eff0f294c47cb7617598dfb3d
7
reference_url https://groups.google.com/g/golang-announce
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce
8
reference_url https://groups.google.com/g/golang-announce/c/-cp44ypCT5s
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/-cp44ypCT5s
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ3S7LB65N54HXXBCB67P4TTOHTNPP5O
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ3S7LB65N54HXXBCB67P4TTOHTNPP5O
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HHGBEGJ54DZZGTXFUQNS7ZIG3E624YAF
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HHGBEGJ54DZZGTXFUQNS7ZIG3E624YAF
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QTFOIDHQRGNI4P6LYN6ILH5G443RYYKB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QTFOIDHQRGNI4P6LYN6ILH5G443RYYKB
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YHYRQB7TRMHDB3NEHW5XBRG7PPMUTPGV
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YHYRQB7TRMHDB3NEHW5XBRG7PPMUTPGV
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFUNHFHQVJSADNH7EZ3B53CYDZVEEPBP
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFUNHFHQVJSADNH7EZ3B53CYDZVEEPBP
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQNPPQWSTP2IX7SHE6TS4SP4EVMI5EZK
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQNPPQWSTP2IX7SHE6TS4SP4EVMI5EZK
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-27191
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-27191
21
reference_url https://pkg.go.dev/vuln/GO-2021-0356
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2021-0356
22
reference_url https://raw.githubusercontent.com/golang/vulndb/df2d3d326300e2ae768f00351ffa96cc2c56cf54/reports/GO-2021-0356.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://raw.githubusercontent.com/golang/vulndb/df2d3d326300e2ae768f00351ffa96cc2c56cf54/reports/GO-2021-0356.yaml
23
reference_url https://security.netapp.com/advisory/ntap-20220429-0002
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220429-0002
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2064702
reference_id 2064702
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2064702
25
reference_url https://access.redhat.com/errata/RHSA-2022:5068
reference_id RHSA-2022:5068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5068
26
reference_url https://access.redhat.com/errata/RHSA-2022:5069
reference_id RHSA-2022:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5069
27
reference_url https://access.redhat.com/errata/RHSA-2022:6527
reference_id RHSA-2022:6527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6527
28
reference_url https://access.redhat.com/errata/RHSA-2022:7401
reference_id RHSA-2022:7401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7401
29
reference_url https://access.redhat.com/errata/RHSA-2022:7457
reference_id RHSA-2022:7457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7457
30
reference_url https://access.redhat.com/errata/RHSA-2022:7469
reference_id RHSA-2022:7469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7469
31
reference_url https://access.redhat.com/errata/RHSA-2022:7954
reference_id RHSA-2022:7954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7954
32
reference_url https://access.redhat.com/errata/RHSA-2022:8634
reference_id RHSA-2022:8634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8634
33
reference_url https://access.redhat.com/errata/RHSA-2022:8893
reference_id RHSA-2022:8893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8893
34
reference_url https://access.redhat.com/errata/RHSA-2022:8932
reference_id RHSA-2022:8932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8932
35
reference_url https://access.redhat.com/errata/RHSA-2022:8938
reference_id RHSA-2022:8938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8938
36
reference_url https://access.redhat.com/errata/RHSA-2022:9096
reference_id RHSA-2022:9096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9096
37
reference_url https://access.redhat.com/errata/RHSA-2022:9107
reference_id RHSA-2022:9107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9107
38
reference_url https://access.redhat.com/errata/RHSA-2023:1325
reference_id RHSA-2023:1325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1325
39
reference_url https://access.redhat.com/errata/RHSA-2023:1326
reference_id RHSA-2023:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1326
40
reference_url https://access.redhat.com/errata/RHSA-2023:3366
reference_id RHSA-2023:3366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3366
41
reference_url https://access.redhat.com/errata/RHSA-2023:3943
reference_id RHSA-2023:3943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3943
42
reference_url https://access.redhat.com/errata/RHSA-2023:4488
reference_id RHSA-2023:4488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4488
fixed_packages
0
url pkg:apk/alpine/podman@3.4.6-r0?arch=ppc64le&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/podman@3.4.6-r0?arch=ppc64le&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@3.4.6-r0%3Farch=ppc64le&distroversion=v3.15&reponame=community
aliases CVE-2022-27191, GHSA-8c26-wmh5-6g9v
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1n1h-e2p4-9yhs
1
url VCID-24f4-v4pk-g7bh
vulnerability_id VCID-24f4-v4pk-g7bh
summary
Podman's default inheritable capabilities for linux container not empty
A bug was found in Podman where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).

This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27649.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27649.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27649
reference_id
reference_type
scores
0
value 0.00489
scoring_system epss
scoring_elements 0.65501
published_at 2026-04-02T12:55:00Z
1
value 0.00489
scoring_system epss
scoring_elements 0.65529
published_at 2026-04-04T12:55:00Z
2
value 0.0054
scoring_system epss
scoring_elements 0.67664
published_at 2026-04-16T12:55:00Z
3
value 0.0054
scoring_system epss
scoring_elements 0.67629
published_at 2026-04-13T12:55:00Z
4
value 0.0054
scoring_system epss
scoring_elements 0.67662
published_at 2026-04-12T12:55:00Z
5
value 0.0054
scoring_system epss
scoring_elements 0.67677
published_at 2026-04-11T12:55:00Z
6
value 0.0054
scoring_system epss
scoring_elements 0.67654
published_at 2026-04-09T12:55:00Z
7
value 0.0054
scoring_system epss
scoring_elements 0.67589
published_at 2026-04-07T12:55:00Z
8
value 0.0054
scoring_system epss
scoring_elements 0.67641
published_at 2026-04-08T12:55:00Z
9
value 0.0054
scoring_system epss
scoring_elements 0.67655
published_at 2026-04-21T12:55:00Z
10
value 0.0054
scoring_system epss
scoring_elements 0.67676
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27649
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2066568
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=2066568
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27649
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/containers/podman
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman
6
reference_url https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0
7
reference_url https://github.com/containers/podman/releases/tag/v4.0.3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman/releases/tag/v4.0.3
8
reference_url https://github.com/containers/podman/security/advisories/GHSA-qvf8-p83w-v58j
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman/security/advisories/GHSA-qvf8-p83w-v58j
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KDETHL5XCT6RZN2BBNOCEXRZ2W3SFU3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KDETHL5XCT6RZN2BBNOCEXRZ2W3SFU3
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-27649
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-27649
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020906
reference_id 1020906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020906
14
reference_url https://access.redhat.com/errata/RHSA-2022:1407
reference_id RHSA-2022:1407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1407
15
reference_url https://access.redhat.com/errata/RHSA-2022:1565
reference_id RHSA-2022:1565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1565
16
reference_url https://access.redhat.com/errata/RHSA-2022:1566
reference_id RHSA-2022:1566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1566
17
reference_url https://access.redhat.com/errata/RHSA-2022:1762
reference_id RHSA-2022:1762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1762
18
reference_url https://access.redhat.com/errata/RHSA-2022:4651
reference_id RHSA-2022:4651
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4651
19
reference_url https://access.redhat.com/errata/RHSA-2022:4816
reference_id RHSA-2022:4816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4816
fixed_packages
0
url pkg:apk/alpine/podman@3.4.6-r0?arch=ppc64le&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/podman@3.4.6-r0?arch=ppc64le&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@3.4.6-r0%3Farch=ppc64le&distroversion=v3.15&reponame=community
aliases CVE-2022-27649, GHSA-qvf8-p83w-v58j
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-24f4-v4pk-g7bh
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@3.4.6-r0%3Farch=ppc64le&distroversion=v3.15&reponame=community