Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/89999?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/89999?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-372.36.1?arch=el8_6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "4.18.0-372.36.1", "qualifiers": { "arch": "el8_6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79539?format=api", "vulnerability_id": "VCID-4xaf-p3np-2kbp", "summary": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1158.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1158.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1158", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04095", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04218", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04134", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04153", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04172", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04203", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04199", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04182", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04158", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05388", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05423", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05153", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05307", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05346", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05386", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05378", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793", "reference_id": "2069793", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793" }, { "reference_url": "https://security.archlinux.org/AVG-2698", "reference_id": "AVG-2698", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2698" }, { "reference_url": "https://security.archlinux.org/AVG-2699", "reference_id": "AVG-2699", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2699" }, { "reference_url": "https://security.archlinux.org/AVG-2700", "reference_id": "AVG-2700", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2700" }, { "reference_url": "https://security.archlinux.org/AVG-2701", "reference_id": "AVG-2701", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7444", "reference_id": "RHSA-2022:7444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7683", "reference_id": "RHSA-2022:7683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8673", "reference_id": "RHSA-2022:8673", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8673" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8685", "reference_id": "RHSA-2022:8685", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8685" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8686", "reference_id": "RHSA-2022:8686", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8686" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8809", "reference_id": "RHSA-2022:8809", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8809" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8831", "reference_id": "RHSA-2022:8831", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8831" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8940", "reference_id": "RHSA-2022:8940", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8940" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8941", "reference_id": "RHSA-2022:8941", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8941" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8989", "reference_id": "RHSA-2022:8989", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8989" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:9082", "reference_id": "RHSA-2022:9082", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:9082" }, { "reference_url": "https://usn.ubuntu.com/5416-1/", "reference_id": "USN-5416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5416-1/" }, { "reference_url": "https://usn.ubuntu.com/5467-1/", "reference_id": "USN-5467-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5467-1/" }, { "reference_url": "https://usn.ubuntu.com/5468-1/", "reference_id": "USN-5468-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5468-1/" }, { "reference_url": "https://usn.ubuntu.com/5469-1/", "reference_id": "USN-5469-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5469-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-1158" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4xaf-p3np-2kbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69121?format=api", "vulnerability_id": "VCID-x6px-n28w-c7h3", "summary": "kernel: wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50164.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50164.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50164", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06385", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06428", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06416", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06466", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06508", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06505", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06498", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06488", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19761", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19917", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19921", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19918", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19811", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19806", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19776", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19685", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50164" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50164" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373419", "reference_id": "2373419", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373419" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8809", "reference_id": "RHSA-2022:8809", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8809" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" } ], "fixed_packages": [], "aliases": [ "CVE-2022-50164" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x6px-n28w-c7h3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79518?format=api", "vulnerability_id": "VCID-zr5e-e394-1fb4", "summary": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2639.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2639.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2639", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.7717", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77118", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77132", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.7714", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78018", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78049", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78075", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78057", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78054", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78089", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78088", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78081", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78115", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78044", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78005", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01101", "scoring_system": "epss", "scoring_elements": "0.78035", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479", "reference_id": "2084479", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7444", "reference_id": "RHSA-2022:7444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7683", "reference_id": "RHSA-2022:7683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8765", "reference_id": "RHSA-2022:8765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8767", "reference_id": "RHSA-2022:8767", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8767" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8768", "reference_id": "RHSA-2022:8768", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8768" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8809", "reference_id": "RHSA-2022:8809", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8809" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8831", "reference_id": "RHSA-2022:8831", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8831" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8940", "reference_id": "RHSA-2022:8940", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8940" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8941", "reference_id": "RHSA-2022:8941", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8941" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8989", "reference_id": "RHSA-2022:8989", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8989" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:9082", "reference_id": "RHSA-2022:9082", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:9082" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0058", "reference_id": "RHSA-2023:0058", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0058" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0059", "reference_id": "RHSA-2023:0059", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0059" }, { "reference_url": "https://usn.ubuntu.com/5650-1/", "reference_id": "USN-5650-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5650-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-2639" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zr5e-e394-1fb4" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.36.1%3Farch=el8_6" }