Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@5.14.0-70.26.1?arch=el9_0
Typerpm
Namespaceredhat
Namekernel
Version5.14.0-70.26.1
Qualifiers
arch el9_0
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-6axn-r2sc-euh1
vulnerability_id VCID-6axn-r2sc-euh1
summary kernel: buffer overflow in nft_set_desc_concat_parse()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2078.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2078.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2078
reference_id
reference_type
scores
0
value 0.00494
scoring_system epss
scoring_elements 0.65777
published_at 2026-04-29T12:55:00Z
1
value 0.00494
scoring_system epss
scoring_elements 0.65767
published_at 2026-04-24T12:55:00Z
2
value 0.00494
scoring_system epss
scoring_elements 0.65778
published_at 2026-04-26T12:55:00Z
3
value 0.00494
scoring_system epss
scoring_elements 0.65679
published_at 2026-04-07T12:55:00Z
4
value 0.00494
scoring_system epss
scoring_elements 0.6573
published_at 2026-04-08T12:55:00Z
5
value 0.00494
scoring_system epss
scoring_elements 0.65742
published_at 2026-04-09T12:55:00Z
6
value 0.00494
scoring_system epss
scoring_elements 0.65763
published_at 2026-04-11T12:55:00Z
7
value 0.00494
scoring_system epss
scoring_elements 0.65749
published_at 2026-04-12T12:55:00Z
8
value 0.00494
scoring_system epss
scoring_elements 0.65719
published_at 2026-04-13T12:55:00Z
9
value 0.00494
scoring_system epss
scoring_elements 0.65754
published_at 2026-04-21T12:55:00Z
10
value 0.00494
scoring_system epss
scoring_elements 0.65768
published_at 2026-04-18T12:55:00Z
11
value 0.00507
scoring_system epss
scoring_elements 0.66268
published_at 2026-04-04T12:55:00Z
12
value 0.00507
scoring_system epss
scoring_elements 0.66241
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2078
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2096178
reference_id 2096178
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2096178
16
reference_url https://access.redhat.com/errata/RHSA-2022:6582
reference_id RHSA-2022:6582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6582
17
reference_url https://access.redhat.com/errata/RHSA-2022:6610
reference_id RHSA-2022:6610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6610
18
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
19
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
20
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
21
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
fixed_packages
aliases CVE-2022-2078
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6axn-r2sc-euh1
1
url VCID-9x6z-na1u-93bs
vulnerability_id VCID-9x6z-na1u-93bs
summary kernel: ice: arfs: fix use-after-free when freeing @rx_cpu_rmap
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49063.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49063.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49063
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04303
published_at 2026-04-29T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04238
published_at 2026-04-21T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.0425
published_at 2026-04-24T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04268
published_at 2026-04-26T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05153
published_at 2026-04-11T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05074
published_at 2026-04-18T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05069
published_at 2026-04-16T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05122
published_at 2026-04-13T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05136
published_at 2026-04-12T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11904
published_at 2026-04-04T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.1186
published_at 2026-04-02T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.23924
published_at 2026-04-09T12:55:00Z
12
value 0.00081
scoring_system epss
scoring_elements 0.23811
published_at 2026-04-07T12:55:00Z
13
value 0.00081
scoring_system epss
scoring_elements 0.23878
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49063
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49063
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348323
reference_id 2348323
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348323
5
reference_url https://git.kernel.org/stable/c/618df75f2e30c7838a3e010ca32cd4893ec9fe33
reference_id 618df75f2e30c7838a3e010ca32cd4893ec9fe33
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:43Z/
url https://git.kernel.org/stable/c/618df75f2e30c7838a3e010ca32cd4893ec9fe33
6
reference_url https://git.kernel.org/stable/c/ba2f6ec28733fb6b24ed086e676df3df4c138f3f
reference_id ba2f6ec28733fb6b24ed086e676df3df4c138f3f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:43Z/
url https://git.kernel.org/stable/c/ba2f6ec28733fb6b24ed086e676df3df4c138f3f
7
reference_url https://git.kernel.org/stable/c/d08d2fb6d99d82da1c63aba5c0d1c6f237e150f3
reference_id d08d2fb6d99d82da1c63aba5c0d1c6f237e150f3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:43Z/
url https://git.kernel.org/stable/c/d08d2fb6d99d82da1c63aba5c0d1c6f237e150f3
8
reference_url https://git.kernel.org/stable/c/d7442f512b71fc63a99c8a801422dde4fbbf9f93
reference_id d7442f512b71fc63a99c8a801422dde4fbbf9f93
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:43Z/
url https://git.kernel.org/stable/c/d7442f512b71fc63a99c8a801422dde4fbbf9f93
9
reference_url https://access.redhat.com/errata/RHSA-2022:6610
reference_id RHSA-2022:6610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6610
10
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
11
reference_url https://usn.ubuntu.com/7654-1/
reference_id USN-7654-1
reference_type
scores
url https://usn.ubuntu.com/7654-1/
12
reference_url https://usn.ubuntu.com/7654-2/
reference_id USN-7654-2
reference_type
scores
url https://usn.ubuntu.com/7654-2/
13
reference_url https://usn.ubuntu.com/7654-3/
reference_id USN-7654-3
reference_type
scores
url https://usn.ubuntu.com/7654-3/
14
reference_url https://usn.ubuntu.com/7654-4/
reference_id USN-7654-4
reference_type
scores
url https://usn.ubuntu.com/7654-4/
15
reference_url https://usn.ubuntu.com/7654-5/
reference_id USN-7654-5
reference_type
scores
url https://usn.ubuntu.com/7654-5/
16
reference_url https://usn.ubuntu.com/7655-1/
reference_id USN-7655-1
reference_type
scores
url https://usn.ubuntu.com/7655-1/
17
reference_url https://usn.ubuntu.com/7686-1/
reference_id USN-7686-1
reference_type
scores
url https://usn.ubuntu.com/7686-1/
18
reference_url https://usn.ubuntu.com/7711-1/
reference_id USN-7711-1
reference_type
scores
url https://usn.ubuntu.com/7711-1/
19
reference_url https://usn.ubuntu.com/7712-1/
reference_id USN-7712-1
reference_type
scores
url https://usn.ubuntu.com/7712-1/
20
reference_url https://usn.ubuntu.com/7712-2/
reference_id USN-7712-2
reference_type
scores
url https://usn.ubuntu.com/7712-2/
fixed_packages
aliases CVE-2022-49063
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9x6z-na1u-93bs
2
url VCID-perg-z9pk-2kew
vulnerability_id VCID-perg-z9pk-2kew
summary kernel: ice: Fix memory corruption in VF driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49722.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49722
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14528
published_at 2026-04-04T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14459
published_at 2026-04-02T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17089
published_at 2026-04-09T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.17064
published_at 2026-04-11T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.17017
published_at 2026-04-12T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16957
published_at 2026-04-13T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16894
published_at 2026-04-16T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16896
published_at 2026-04-18T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16933
published_at 2026-04-21T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16837
published_at 2026-04-24T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.16819
published_at 2026-04-26T12:55:00Z
11
value 0.00054
scoring_system epss
scoring_elements 0.16774
published_at 2026-04-29T12:55:00Z
12
value 0.00054
scoring_system epss
scoring_elements 0.16941
published_at 2026-04-07T12:55:00Z
13
value 0.00054
scoring_system epss
scoring_elements 0.1703
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49722
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49722
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348117
reference_id 2348117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348117
5
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
6
reference_url https://access.redhat.com/errata/RHSA-2022:6610
reference_id RHSA-2022:6610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6610
fixed_packages
aliases CVE-2022-49722
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-perg-z9pk-2kew
3
url VCID-x1jg-kp4b-eugz
vulnerability_id VCID-x1jg-kp4b-eugz
summary kernel: heap overflow in nft_set_elem_init()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34918.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-34918
reference_id
reference_type
scores
0
value 0.3234
scoring_system epss
scoring_elements 0.96858
published_at 2026-04-29T12:55:00Z
1
value 0.3234
scoring_system epss
scoring_elements 0.96852
published_at 2026-04-21T12:55:00Z
2
value 0.3234
scoring_system epss
scoring_elements 0.96853
published_at 2026-04-24T12:55:00Z
3
value 0.3234
scoring_system epss
scoring_elements 0.96855
published_at 2026-04-26T12:55:00Z
4
value 0.3234
scoring_system epss
scoring_elements 0.96826
published_at 2026-04-07T12:55:00Z
5
value 0.3234
scoring_system epss
scoring_elements 0.96834
published_at 2026-04-08T12:55:00Z
6
value 0.3234
scoring_system epss
scoring_elements 0.96835
published_at 2026-04-09T12:55:00Z
7
value 0.3234
scoring_system epss
scoring_elements 0.96837
published_at 2026-04-11T12:55:00Z
8
value 0.3234
scoring_system epss
scoring_elements 0.96838
published_at 2026-04-12T12:55:00Z
9
value 0.3234
scoring_system epss
scoring_elements 0.96839
published_at 2026-04-13T12:55:00Z
10
value 0.3234
scoring_system epss
scoring_elements 0.96846
published_at 2026-04-16T12:55:00Z
11
value 0.3234
scoring_system epss
scoring_elements 0.9685
published_at 2026-04-18T12:55:00Z
12
value 0.3544
scoring_system epss
scoring_elements 0.97031
published_at 2026-04-02T12:55:00Z
13
value 0.3544
scoring_system epss
scoring_elements 0.97034
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-34918
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2104423
reference_id 2104423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2104423
13
reference_url https://access.redhat.com/errata/RHSA-2022:6582
reference_id RHSA-2022:6582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6582
14
reference_url https://access.redhat.com/errata/RHSA-2022:6592
reference_id RHSA-2022:6592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6592
15
reference_url https://access.redhat.com/errata/RHSA-2022:6610
reference_id RHSA-2022:6610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6610
16
reference_url https://usn.ubuntu.com/5540-1/
reference_id USN-5540-1
reference_type
scores
url https://usn.ubuntu.com/5540-1/
17
reference_url https://usn.ubuntu.com/5544-1/
reference_id USN-5544-1
reference_type
scores
url https://usn.ubuntu.com/5544-1/
18
reference_url https://usn.ubuntu.com/5545-1/
reference_id USN-5545-1
reference_type
scores
url https://usn.ubuntu.com/5545-1/
19
reference_url https://usn.ubuntu.com/5560-1/
reference_id USN-5560-1
reference_type
scores
url https://usn.ubuntu.com/5560-1/
20
reference_url https://usn.ubuntu.com/5560-2/
reference_id USN-5560-2
reference_type
scores
url https://usn.ubuntu.com/5560-2/
21
reference_url https://usn.ubuntu.com/5562-1/
reference_id USN-5562-1
reference_type
scores
url https://usn.ubuntu.com/5562-1/
22
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
23
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
24
reference_url https://usn.ubuntu.com/5582-1/
reference_id USN-5582-1
reference_type
scores
url https://usn.ubuntu.com/5582-1/
fixed_packages
aliases CVE-2022-34918
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x1jg-kp4b-eugz
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-70.26.1%3Farch=el9_0