Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-477.55.1?arch=el8_8
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-477.55.1
Qualifiers
arch el8_8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-54qr-x4vv-xfex
vulnerability_id VCID-54qr-x4vv-xfex
summary kernel: tty: n_gsm: fix deadlock and link starvation in outgoing data path
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50116.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50116.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50116
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02662
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02691
published_at 2026-04-04T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02699
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02701
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02722
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02695
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.0268
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02677
published_at 2026-04-13T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11231
published_at 2026-04-29T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11269
published_at 2026-04-16T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.1127
published_at 2026-04-18T12:55:00Z
11
value 0.00038
scoring_system epss
scoring_elements 0.11397
published_at 2026-04-21T12:55:00Z
12
value 0.00038
scoring_system epss
scoring_elements 0.11339
published_at 2026-04-24T12:55:00Z
13
value 0.00038
scoring_system epss
scoring_elements 0.11295
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50116
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50116
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373692
reference_id 2373692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373692
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
7
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50116
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-54qr-x4vv-xfex
1
url VCID-b5ve-8bn6-vbav
vulnerability_id VCID-b5ve-8bn6-vbav
summary kernel: untrusted VMM can trigger int80 syscall handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25744.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25744.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25744
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14759
published_at 2026-04-29T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14813
published_at 2026-04-13T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.1471
published_at 2026-04-16T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14717
published_at 2026-04-18T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14777
published_at 2026-04-21T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14814
published_at 2026-04-26T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14924
published_at 2026-04-02T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.15001
published_at 2026-04-04T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14805
published_at 2026-04-07T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14895
published_at 2026-04-08T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14946
published_at 2026-04-09T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.1491
published_at 2026-04-11T12:55:00Z
12
value 0.00048
scoring_system epss
scoring_elements 0.14872
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25744
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2263875
reference_id 2263875
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2263875
4
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.7
reference_id ChangeLog-6.6.7
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-13T20:00:17Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.7
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30
reference_id ?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-13T20:00:17Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30
6
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
7
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
8
reference_url https://access.redhat.com/errata/RHSA-2024:2845
reference_id RHSA-2024:2845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2845
9
reference_url https://access.redhat.com/errata/RHSA-2024:2846
reference_id RHSA-2024:2846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2846
10
reference_url https://access.redhat.com/errata/RHSA-2024:3618
reference_id RHSA-2024:3618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3618
11
reference_url https://access.redhat.com/errata/RHSA-2024:3627
reference_id RHSA-2024:3627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3627
12
reference_url https://usn.ubuntu.com/6680-1/
reference_id USN-6680-1
reference_type
scores
url https://usn.ubuntu.com/6680-1/
13
reference_url https://usn.ubuntu.com/6680-2/
reference_id USN-6680-2
reference_type
scores
url https://usn.ubuntu.com/6680-2/
14
reference_url https://usn.ubuntu.com/6680-3/
reference_id USN-6680-3
reference_type
scores
url https://usn.ubuntu.com/6680-3/
15
reference_url https://usn.ubuntu.com/6926-1/
reference_id USN-6926-1
reference_type
scores
url https://usn.ubuntu.com/6926-1/
16
reference_url https://usn.ubuntu.com/6926-2/
reference_id USN-6926-2
reference_type
scores
url https://usn.ubuntu.com/6926-2/
17
reference_url https://usn.ubuntu.com/6926-3/
reference_id USN-6926-3
reference_type
scores
url https://usn.ubuntu.com/6926-3/
18
reference_url https://usn.ubuntu.com/7100-1/
reference_id USN-7100-1
reference_type
scores
url https://usn.ubuntu.com/7100-1/
19
reference_url https://usn.ubuntu.com/7100-2/
reference_id USN-7100-2
reference_type
scores
url https://usn.ubuntu.com/7100-2/
20
reference_url https://usn.ubuntu.com/7123-1/
reference_id USN-7123-1
reference_type
scores
url https://usn.ubuntu.com/7123-1/
21
reference_url https://usn.ubuntu.com/7144-1/
reference_id USN-7144-1
reference_type
scores
url https://usn.ubuntu.com/7144-1/
22
reference_url https://usn.ubuntu.com/7194-1/
reference_id USN-7194-1
reference_type
scores
url https://usn.ubuntu.com/7194-1/
fixed_packages
aliases CVE-2024-25744
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b5ve-8bn6-vbav
2
url VCID-brz8-6j8x-aqep
vulnerability_id VCID-brz8-6j8x-aqep
summary kernel: tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49940.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49940.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49940
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06468
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0652
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0651
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.0656
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06602
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06596
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06588
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06579
published_at 2026-04-13T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.19934
published_at 2026-04-29T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20082
published_at 2026-04-16T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20086
published_at 2026-04-18T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20084
published_at 2026-04-21T12:55:00Z
12
value 0.00065
scoring_system epss
scoring_elements 0.19968
published_at 2026-04-24T12:55:00Z
13
value 0.00065
scoring_system epss
scoring_elements 0.19964
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49940
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49940
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373397
reference_id 2373397
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373397
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
7
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-49940
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-brz8-6j8x-aqep
3
url VCID-cavt-1v84-uqgt
vulnerability_id VCID-cavt-1v84-uqgt
summary kernel: GSM multiplexing race condition leads to privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6546
reference_id
reference_type
scores
0
value 0.00328
scoring_system epss
scoring_elements 0.55796
published_at 2026-04-02T12:55:00Z
1
value 0.00328
scoring_system epss
scoring_elements 0.55818
published_at 2026-04-04T12:55:00Z
2
value 0.00328
scoring_system epss
scoring_elements 0.55798
published_at 2026-04-07T12:55:00Z
3
value 0.00328
scoring_system epss
scoring_elements 0.55849
published_at 2026-04-08T12:55:00Z
4
value 0.00328
scoring_system epss
scoring_elements 0.55852
published_at 2026-04-09T12:55:00Z
5
value 0.00328
scoring_system epss
scoring_elements 0.55861
published_at 2026-04-11T12:55:00Z
6
value 0.00328
scoring_system epss
scoring_elements 0.55841
published_at 2026-04-12T12:55:00Z
7
value 0.00328
scoring_system epss
scoring_elements 0.55822
published_at 2026-04-13T12:55:00Z
8
value 0.00328
scoring_system epss
scoring_elements 0.55859
published_at 2026-04-16T12:55:00Z
9
value 0.00328
scoring_system epss
scoring_elements 0.55862
published_at 2026-04-18T12:55:00Z
10
value 0.00337
scoring_system epss
scoring_elements 0.56525
published_at 2026-04-29T12:55:00Z
11
value 0.00337
scoring_system epss
scoring_elements 0.56589
published_at 2026-04-21T12:55:00Z
12
value 0.00337
scoring_system epss
scoring_elements 0.56524
published_at 2026-04-24T12:55:00Z
13
value 0.00337
scoring_system epss
scoring_elements 0.56543
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255498
reference_id 2255498
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255498
5
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
6
reference_url https://access.redhat.com/errata/RHSA-2024:0937
reference_id RHSA-2024:0937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0937
7
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
8
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
9
reference_url https://access.redhat.com/errata/RHSA-2024:1055
reference_id RHSA-2024:1055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1055
10
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
11
reference_url https://access.redhat.com/errata/RHSA-2024:1253
reference_id RHSA-2024:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1253
12
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
13
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
14
reference_url https://access.redhat.com/errata/RHSA-2024:1612
reference_id RHSA-2024:1612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1612
15
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
16
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
17
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
18
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
19
reference_url https://access.redhat.com/errata/RHSA-2024:2697
reference_id RHSA-2024:2697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2697
20
reference_url https://access.redhat.com/errata/RHSA-2024:4577
reference_id RHSA-2024:4577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4577
21
reference_url https://access.redhat.com/errata/RHSA-2024:4729
reference_id RHSA-2024:4729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4729
22
reference_url https://access.redhat.com/errata/RHSA-2024:4731
reference_id RHSA-2024:4731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4731
23
reference_url https://access.redhat.com/errata/RHSA-2024:4970
reference_id RHSA-2024:4970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4970
fixed_packages
aliases CVE-2023-6546
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cavt-1v84-uqgt
4
url VCID-j8ze-t6w6-ekak
vulnerability_id VCID-j8ze-t6w6-ekak
summary kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42895
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21274
published_at 2026-04-29T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21444
published_at 2026-04-21T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21296
published_at 2026-04-24T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21294
published_at 2026-04-26T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22902
published_at 2026-04-11T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22918
published_at 2026-04-02T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22816
published_at 2026-04-18T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22822
published_at 2026-04-16T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22809
published_at 2026-04-13T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22865
published_at 2026-04-12T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22962
published_at 2026-04-04T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22755
published_at 2026-04-07T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.22829
published_at 2026-04-08T12:55:00Z
13
value 0.00076
scoring_system epss
scoring_elements 0.22882
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42895
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2147356
reference_id 2147356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2147356
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_id #b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/
url https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e
10
reference_url https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_id b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/
url https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e
11
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
12
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
13
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
14
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
15
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
16
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
17
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
18
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
19
reference_url https://usn.ubuntu.com/5853-1/
reference_id USN-5853-1
reference_type
scores
url https://usn.ubuntu.com/5853-1/
20
reference_url https://usn.ubuntu.com/5858-1/
reference_id USN-5858-1
reference_type
scores
url https://usn.ubuntu.com/5858-1/
21
reference_url https://usn.ubuntu.com/5859-1/
reference_id USN-5859-1
reference_type
scores
url https://usn.ubuntu.com/5859-1/
22
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
23
reference_url https://usn.ubuntu.com/5874-1/
reference_id USN-5874-1
reference_type
scores
url https://usn.ubuntu.com/5874-1/
24
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
25
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
26
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
27
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
28
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
29
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
30
reference_url https://usn.ubuntu.com/5884-1/
reference_id USN-5884-1
reference_type
scores
url https://usn.ubuntu.com/5884-1/
31
reference_url https://usn.ubuntu.com/5909-1/
reference_id USN-5909-1
reference_type
scores
url https://usn.ubuntu.com/5909-1/
32
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
33
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
34
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
35
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
36
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
37
reference_url https://usn.ubuntu.com/5926-1/
reference_id USN-5926-1
reference_type
scores
url https://usn.ubuntu.com/5926-1/
38
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
39
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
40
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
fixed_packages
aliases CVE-2022-42895
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j8ze-t6w6-ekak
5
url VCID-mtrd-vfmy-pbcz
vulnerability_id VCID-mtrd-vfmy-pbcz
summary kernel: ext4: kernel bug in ext4_write_inline_data_end()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33631.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33631.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33631
reference_id
reference_type
scores
0
value 0.00195
scoring_system epss
scoring_elements 0.41228
published_at 2026-04-29T12:55:00Z
1
value 0.00255
scoring_system epss
scoring_elements 0.48881
published_at 2026-04-02T12:55:00Z
2
value 0.00255
scoring_system epss
scoring_elements 0.4886
published_at 2026-04-07T12:55:00Z
3
value 0.00255
scoring_system epss
scoring_elements 0.48844
published_at 2026-04-01T12:55:00Z
4
value 0.00255
scoring_system epss
scoring_elements 0.48916
published_at 2026-04-21T12:55:00Z
5
value 0.00255
scoring_system epss
scoring_elements 0.48955
published_at 2026-04-18T12:55:00Z
6
value 0.00255
scoring_system epss
scoring_elements 0.48958
published_at 2026-04-16T12:55:00Z
7
value 0.00255
scoring_system epss
scoring_elements 0.48911
published_at 2026-04-13T12:55:00Z
8
value 0.00255
scoring_system epss
scoring_elements 0.48903
published_at 2026-04-12T12:55:00Z
9
value 0.00255
scoring_system epss
scoring_elements 0.48929
published_at 2026-04-11T12:55:00Z
10
value 0.00255
scoring_system epss
scoring_elements 0.48912
published_at 2026-04-09T12:55:00Z
11
value 0.00255
scoring_system epss
scoring_elements 0.48914
published_at 2026-04-26T12:55:00Z
12
value 0.00255
scoring_system epss
scoring_elements 0.48907
published_at 2026-04-04T12:55:00Z
13
value 0.00255
scoring_system epss
scoring_elements 0.48904
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33631
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33631
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/02/03/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/02/03/1
5
reference_url http://www.openwall.com/lists/oss-security/2024/01/30/10
reference_id 10
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/01/30/10
6
reference_url https://gitee.com/src-openeuler/kernel/pulls/1389
reference_id 1389
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://gitee.com/src-openeuler/kernel/pulls/1389
7
reference_url https://gitee.com/src-openeuler/kernel/pulls/1396
reference_id 1396
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://gitee.com/src-openeuler/kernel/pulls/1396
8
reference_url http://www.openwall.com/lists/oss-security/2024/01/31/2
reference_id 2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/01/31/2
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2261976
reference_id 2261976
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2261976
10
reference_url http://www.openwall.com/lists/oss-security/2024/01/30/3
reference_id 3
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/01/30/3
11
reference_url http://www.openwall.com/lists/oss-security/2024/01/31/3
reference_id 3
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/01/31/3
12
reference_url http://www.openwall.com/lists/oss-security/2024/01/30/4
reference_id 4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/01/30/4
13
reference_url http://www.openwall.com/lists/oss-security/2024/01/30/5
reference_id 5
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/01/30/5
14
reference_url http://www.openwall.com/lists/oss-security/2024/02/02/6
reference_id 6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/02/02/6
15
reference_url http://www.openwall.com/lists/oss-security/2024/01/30/9
reference_id 9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/01/30/9
16
reference_url http://www.openwall.com/lists/oss-security/2024/02/02/9
reference_id 9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/02/02/9
17
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8
reference_id ?id=5c099c4fdc438014d5893629e70a8ba934433ee8
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8
18
reference_url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030
reference_id ?id=openEuler-SA-2024-1030
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030
19
reference_url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031
reference_id ?id=openEuler-SA-2024-1031
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031
20
reference_url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032
reference_id ?id=openEuler-SA-2024-1032
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032
21
reference_url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033
reference_id ?id=openEuler-SA-2024-1033
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033
22
reference_url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034
reference_id ?id=openEuler-SA-2024-1034
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034
23
reference_url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035
reference_id ?id=openEuler-SA-2024-1035
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035
24
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
25
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
26
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
27
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
28
reference_url https://access.redhat.com/errata/RHSA-2024:1653
reference_id RHSA-2024:1653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1653
29
reference_url https://access.redhat.com/errata/RHSA-2024:1836
reference_id RHSA-2024:1836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1836
30
reference_url https://access.redhat.com/errata/RHSA-2024:1840
reference_id RHSA-2024:1840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1840
31
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
32
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
33
reference_url https://usn.ubuntu.com/6865-1/
reference_id USN-6865-1
reference_type
scores
url https://usn.ubuntu.com/6865-1/
34
reference_url https://usn.ubuntu.com/6866-1/
reference_id USN-6866-1
reference_type
scores
url https://usn.ubuntu.com/6866-1/
35
reference_url https://usn.ubuntu.com/6866-2/
reference_id USN-6866-2
reference_type
scores
url https://usn.ubuntu.com/6866-2/
36
reference_url https://usn.ubuntu.com/6866-3/
reference_id USN-6866-3
reference_type
scores
url https://usn.ubuntu.com/6866-3/
fixed_packages
aliases CVE-2021-33631
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mtrd-vfmy-pbcz
6
url VCID-wm98-kp5f-mudg
vulnerability_id VCID-wm98-kp5f-mudg
summary kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3640.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3640
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07981
published_at 2026-04-29T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07946
published_at 2026-04-16T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07932
published_at 2026-04-18T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.0809
published_at 2026-04-21T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08042
published_at 2026-04-24T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.08007
published_at 2026-04-26T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.083
published_at 2026-04-09T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08271
published_at 2026-04-12T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08252
published_at 2026-04-13T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08291
published_at 2026-04-11T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08214
published_at 2026-04-02T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08267
published_at 2026-04-04T12:55:00Z
12
value 0.00029
scoring_system epss
scoring_elements 0.08217
published_at 2026-04-07T12:55:00Z
13
value 0.00029
scoring_system epss
scoring_elements 0.08281
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3640
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2139610
reference_id 2139610
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2139610
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
8
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
9
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
10
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
11
reference_url https://access.redhat.com/errata/RHSA-2025:22910
reference_id RHSA-2025:22910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22910
12
reference_url https://access.redhat.com/errata/RHSA-2025:22914
reference_id RHSA-2025:22914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22914
13
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
14
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
15
reference_url https://usn.ubuntu.com/5853-1/
reference_id USN-5853-1
reference_type
scores
url https://usn.ubuntu.com/5853-1/
16
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
17
reference_url https://usn.ubuntu.com/5874-1/
reference_id USN-5874-1
reference_type
scores
url https://usn.ubuntu.com/5874-1/
18
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
19
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
20
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
21
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
22
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
23
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
24
reference_url https://usn.ubuntu.com/5909-1/
reference_id USN-5909-1
reference_type
scores
url https://usn.ubuntu.com/5909-1/
25
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
26
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
27
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
28
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
29
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
30
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
31
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
32
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
33
reference_url https://usn.ubuntu.com/7607-1/
reference_id USN-7607-1
reference_type
scores
url https://usn.ubuntu.com/7607-1/
34
reference_url https://usn.ubuntu.com/7607-2/
reference_id USN-7607-2
reference_type
scores
url https://usn.ubuntu.com/7607-2/
35
reference_url https://usn.ubuntu.com/7607-3/
reference_id USN-7607-3
reference_type
scores
url https://usn.ubuntu.com/7607-3/
fixed_packages
aliases CVE-2022-3640
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wm98-kp5f-mudg
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-477.55.1%3Farch=el8_8