Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@5.14.0-70.70.1?arch=el9_0
Typerpm
Namespaceredhat
Namekernel
Version5.14.0-70.70.1
Qualifiers
arch el9_0
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-6nm8-f9v9-bqe3
vulnerability_id VCID-6nm8-f9v9-bqe3
summary kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0458.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0458
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24773
published_at 2026-04-02T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.2445
published_at 2026-04-29T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24702
published_at 2026-04-09T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24716
published_at 2026-04-11T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24675
published_at 2026-04-12T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24618
published_at 2026-04-13T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24631
published_at 2026-04-16T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24621
published_at 2026-04-18T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.2456
published_at 2026-04-21T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24504
published_at 2026-04-24T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24491
published_at 2026-04-26T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24812
published_at 2026-04-04T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.24585
published_at 2026-04-07T12:55:00Z
13
value 0.00085
scoring_system epss
scoring_elements 0.24655
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0458
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0458
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2193219
reference_id 2193219
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2193219
5
reference_url https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11
reference_id 739790605705ddcf18f21782b9c99ad7d53a8c11
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/
url https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11
6
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:4377
reference_id RHSA-2023:4377
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4377
9
reference_url https://access.redhat.com/errata/RHSA-2023:4378
reference_id RHSA-2023:4378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4378
10
reference_url https://access.redhat.com/errata/RHSA-2023:4801
reference_id RHSA-2023:4801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4801
11
reference_url https://access.redhat.com/errata/RHSA-2023:4814
reference_id RHSA-2023:4814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4814
12
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
13
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
14
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
15
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
16
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7
reference_id sys.c?id=v6.1.8&id2=v6.1.7
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7
17
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
18
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
19
reference_url https://usn.ubuntu.com/6093-1/
reference_id USN-6093-1
reference_type
scores
url https://usn.ubuntu.com/6093-1/
20
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
21
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
22
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
23
reference_url https://usn.ubuntu.com/6254-1/
reference_id USN-6254-1
reference_type
scores
url https://usn.ubuntu.com/6254-1/
24
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
25
reference_url https://usn.ubuntu.com/6341-1/
reference_id USN-6341-1
reference_type
scores
url https://usn.ubuntu.com/6341-1/
26
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
fixed_packages
aliases CVE-2023-0458
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6nm8-f9v9-bqe3
1
url VCID-7jsu-xc3w-z3a2
vulnerability_id VCID-7jsu-xc3w-z3a2
summary kernel: buffer overflow in ceph file net/ceph/messenger_v2.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44466.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-44466
reference_id
reference_type
scores
0
value 0.13171
scoring_system epss
scoring_elements 0.94097
published_at 2026-04-02T12:55:00Z
1
value 0.13171
scoring_system epss
scoring_elements 0.94108
published_at 2026-04-04T12:55:00Z
2
value 0.13171
scoring_system epss
scoring_elements 0.94112
published_at 2026-04-07T12:55:00Z
3
value 0.13171
scoring_system epss
scoring_elements 0.94121
published_at 2026-04-08T12:55:00Z
4
value 0.13171
scoring_system epss
scoring_elements 0.94125
published_at 2026-04-09T12:55:00Z
5
value 0.13171
scoring_system epss
scoring_elements 0.9413
published_at 2026-04-13T12:55:00Z
6
value 0.13171
scoring_system epss
scoring_elements 0.94129
published_at 2026-04-12T12:55:00Z
7
value 0.13171
scoring_system epss
scoring_elements 0.94146
published_at 2026-04-16T12:55:00Z
8
value 0.13171
scoring_system epss
scoring_elements 0.94151
published_at 2026-04-18T12:55:00Z
9
value 0.15852
scoring_system epss
scoring_elements 0.94762
published_at 2026-04-26T12:55:00Z
10
value 0.15852
scoring_system epss
scoring_elements 0.94763
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-44466
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241342
reference_id 2241342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241342
3
reference_url https://access.redhat.com/errata/RHSA-2023:4789
reference_id RHSA-2023:4789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4789
4
reference_url https://access.redhat.com/errata/RHSA-2023:4801
reference_id RHSA-2023:4801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4801
5
reference_url https://access.redhat.com/errata/RHSA-2023:4962
reference_id RHSA-2023:4962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4962
6
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
7
reference_url https://access.redhat.com/errata/RHSA-2023:5244
reference_id RHSA-2023:5244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5244
8
reference_url https://usn.ubuntu.com/6416-1/
reference_id USN-6416-1
reference_type
scores
url https://usn.ubuntu.com/6416-1/
9
reference_url https://usn.ubuntu.com/6416-2/
reference_id USN-6416-2
reference_type
scores
url https://usn.ubuntu.com/6416-2/
10
reference_url https://usn.ubuntu.com/6416-3/
reference_id USN-6416-3
reference_type
scores
url https://usn.ubuntu.com/6416-3/
11
reference_url https://usn.ubuntu.com/6445-1/
reference_id USN-6445-1
reference_type
scores
url https://usn.ubuntu.com/6445-1/
12
reference_url https://usn.ubuntu.com/6445-2/
reference_id USN-6445-2
reference_type
scores
url https://usn.ubuntu.com/6445-2/
13
reference_url https://usn.ubuntu.com/6464-1/
reference_id USN-6464-1
reference_type
scores
url https://usn.ubuntu.com/6464-1/
14
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
15
reference_url https://usn.ubuntu.com/6520-1/
reference_id USN-6520-1
reference_type
scores
url https://usn.ubuntu.com/6520-1/
fixed_packages
aliases CVE-2023-44466
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jsu-xc3w-z3a2
2
url VCID-axj2-267a-5kdv
vulnerability_id VCID-axj2-267a-5kdv
summary kernel: ipvlan: out-of-bounds write caused by unclear skb->cb
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3090.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3090.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3090
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01738
published_at 2026-04-18T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01748
published_at 2026-04-13T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.0175
published_at 2026-04-12T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.0174
published_at 2026-04-02T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01765
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01756
published_at 2026-04-08T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01753
published_at 2026-04-07T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01754
published_at 2026-04-04T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.0176
published_at 2026-04-11T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01823
published_at 2026-04-21T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.0216
published_at 2026-04-29T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02145
published_at 2026-04-24T12:55:00Z
12
value 0.00013
scoring_system epss
scoring_elements 0.02136
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3090
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218672
reference_id 2218672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2218672
35
reference_url https://kernel.dance/90cbed5247439a966b645b34eb0a2e037836ea8e
reference_id 90cbed5247439a966b645b34eb0a2e037836ea8e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url https://kernel.dance/90cbed5247439a966b645b34eb0a2e037836ea8e
36
reference_url https://www.debian.org/security/2023/dsa-5448
reference_id dsa-5448
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url https://www.debian.org/security/2023/dsa-5448
37
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url https://www.debian.org/security/2023/dsa-5480
38
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e
reference_id ?id=90cbed5247439a966b645b34eb0a2e037836ea8e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e
39
reference_url http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
40
reference_url http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
41
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
42
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
43
reference_url https://security.netapp.com/advisory/ntap-20230731-0002/
reference_id ntap-20230731-0002
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url https://security.netapp.com/advisory/ntap-20230731-0002/
44
reference_url https://access.redhat.com/errata/RHSA-2023:4377
reference_id RHSA-2023:4377
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4377
45
reference_url https://access.redhat.com/errata/RHSA-2023:4378
reference_id RHSA-2023:4378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4378
46
reference_url https://access.redhat.com/errata/RHSA-2023:4380
reference_id RHSA-2023:4380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4380
47
reference_url https://access.redhat.com/errata/RHSA-2023:4515
reference_id RHSA-2023:4515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4515
48
reference_url https://access.redhat.com/errata/RHSA-2023:4516
reference_id RHSA-2023:4516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4516
49
reference_url https://access.redhat.com/errata/RHSA-2023:4801
reference_id RHSA-2023:4801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4801
50
reference_url https://access.redhat.com/errata/RHSA-2023:4814
reference_id RHSA-2023:4814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4814
51
reference_url https://access.redhat.com/errata/RHSA-2023:4815
reference_id RHSA-2023:4815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4815
52
reference_url https://access.redhat.com/errata/RHSA-2023:4817
reference_id RHSA-2023:4817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4817
53
reference_url https://access.redhat.com/errata/RHSA-2023:4828
reference_id RHSA-2023:4828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4828
54
reference_url https://access.redhat.com/errata/RHSA-2023:4829
reference_id RHSA-2023:4829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4829
55
reference_url https://access.redhat.com/errata/RHSA-2023:4961
reference_id RHSA-2023:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4961
56
reference_url https://access.redhat.com/errata/RHSA-2023:4962
reference_id RHSA-2023:4962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4962
57
reference_url https://access.redhat.com/errata/RHSA-2023:4967
reference_id RHSA-2023:4967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4967
58
reference_url https://access.redhat.com/errata/RHSA-2023:5221
reference_id RHSA-2023:5221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5221
59
reference_url https://access.redhat.com/errata/RHSA-2023:5244
reference_id RHSA-2023:5244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5244
60
reference_url https://access.redhat.com/errata/RHSA-2023:5255
reference_id RHSA-2023:5255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5255
61
reference_url https://access.redhat.com/errata/RHSA-2023:5548
reference_id RHSA-2023:5548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5548
62
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
63
reference_url https://usn.ubuntu.com/6231-1/
reference_id USN-6231-1
reference_type
scores
url https://usn.ubuntu.com/6231-1/
64
reference_url https://usn.ubuntu.com/6246-1/
reference_id USN-6246-1
reference_type
scores
url https://usn.ubuntu.com/6246-1/
65
reference_url https://usn.ubuntu.com/6250-1/
reference_id USN-6250-1
reference_type
scores
url https://usn.ubuntu.com/6250-1/
66
reference_url https://usn.ubuntu.com/6251-1/
reference_id USN-6251-1
reference_type
scores
url https://usn.ubuntu.com/6251-1/
67
reference_url https://usn.ubuntu.com/6252-1/
reference_id USN-6252-1
reference_type
scores
url https://usn.ubuntu.com/6252-1/
68
reference_url https://usn.ubuntu.com/6254-1/
reference_id USN-6254-1
reference_type
scores
url https://usn.ubuntu.com/6254-1/
69
reference_url https://usn.ubuntu.com/6255-1/
reference_id USN-6255-1
reference_type
scores
url https://usn.ubuntu.com/6255-1/
70
reference_url https://usn.ubuntu.com/6260-1/
reference_id USN-6260-1
reference_type
scores
url https://usn.ubuntu.com/6260-1/
71
reference_url https://usn.ubuntu.com/6261-1/
reference_id USN-6261-1
reference_type
scores
url https://usn.ubuntu.com/6261-1/
72
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
fixed_packages
aliases CVE-2023-3090
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-axj2-267a-5kdv
3
url VCID-jptx-14zk-5bat
vulnerability_id VCID-jptx-14zk-5bat
summary kernel: kernel info leak issue in pfkey_register
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1353.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1353.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1353
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02435
published_at 2026-04-29T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.0241
published_at 2026-04-21T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02392
published_at 2026-04-24T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02381
published_at 2026-04-26T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04493
published_at 2026-04-18T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04427
published_at 2026-04-01T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04466
published_at 2026-04-02T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04491
published_at 2026-04-04T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04504
published_at 2026-04-07T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.0454
published_at 2026-04-08T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04556
published_at 2026-04-09T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04543
published_at 2026-04-11T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04528
published_at 2026-04-12T12:55:00Z
13
value 0.00018
scoring_system epss
scoring_elements 0.04513
published_at 2026-04-13T12:55:00Z
14
value 0.00018
scoring_system epss
scoring_elements 0.04484
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1353
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
42
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2066819
reference_id 2066819
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2066819
44
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
45
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
46
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
47
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
48
reference_url https://access.redhat.com/errata/RHSA-2022:5934
reference_id RHSA-2022:5934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5934
49
reference_url https://access.redhat.com/errata/RHSA-2022:5998
reference_id RHSA-2022:5998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5998
50
reference_url https://access.redhat.com/errata/RHSA-2022:6243
reference_id RHSA-2022:6243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6243
51
reference_url https://access.redhat.com/errata/RHSA-2022:6248
reference_id RHSA-2022:6248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6248
52
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
53
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
54
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
55
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
56
reference_url https://access.redhat.com/errata/RHSA-2023:4801
reference_id RHSA-2023:4801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4801
57
reference_url https://access.redhat.com/errata/RHSA-2023:4814
reference_id RHSA-2023:4814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4814
58
reference_url https://usn.ubuntu.com/5467-1/
reference_id USN-5467-1
reference_type
scores
url https://usn.ubuntu.com/5467-1/
59
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
60
reference_url https://usn.ubuntu.com/5500-1/
reference_id USN-5500-1
reference_type
scores
url https://usn.ubuntu.com/5500-1/
61
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
62
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
63
reference_url https://usn.ubuntu.com/5515-1/
reference_id USN-5515-1
reference_type
scores
url https://usn.ubuntu.com/5515-1/
64
reference_url https://usn.ubuntu.com/5541-1/
reference_id USN-5541-1
reference_type
scores
url https://usn.ubuntu.com/5541-1/
fixed_packages
aliases CVE-2022-1353
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jptx-14zk-5bat
4
url VCID-p3kq-83eq-kba4
vulnerability_id VCID-p3kq-83eq-kba4
summary kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28466.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28466
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.0562
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05878
published_at 2026-04-29T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.0569
published_at 2026-04-12T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05684
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05638
published_at 2026-04-16T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.0565
published_at 2026-04-18T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05798
published_at 2026-04-21T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05831
published_at 2026-04-24T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-26T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.0566
published_at 2026-04-04T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05653
published_at 2026-04-07T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05691
published_at 2026-04-08T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05718
published_at 2026-04-09T12:55:00Z
13
value 0.00021
scoring_system epss
scoring_elements 0.05697
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28466
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28466
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179000
reference_id 2179000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179000
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962
reference_id commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:51Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962
6
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:51Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
7
reference_url https://security.netapp.com/advisory/ntap-20230427-0006/
reference_id ntap-20230427-0006
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:51Z/
url https://security.netapp.com/advisory/ntap-20230427-0006/
8
reference_url https://access.redhat.com/errata/RHSA-2023:3708
reference_id RHSA-2023:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3708
9
reference_url https://access.redhat.com/errata/RHSA-2023:3723
reference_id RHSA-2023:3723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3723
10
reference_url https://access.redhat.com/errata/RHSA-2023:3819
reference_id RHSA-2023:3819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3819
11
reference_url https://access.redhat.com/errata/RHSA-2023:3847
reference_id RHSA-2023:3847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3847
12
reference_url https://access.redhat.com/errata/RHSA-2023:4789
reference_id RHSA-2023:4789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4789
13
reference_url https://access.redhat.com/errata/RHSA-2023:4801
reference_id RHSA-2023:4801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4801
14
reference_url https://access.redhat.com/errata/RHSA-2023:4814
reference_id RHSA-2023:4814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4814
15
reference_url https://usn.ubuntu.com/6033-1/
reference_id USN-6033-1
reference_type
scores
url https://usn.ubuntu.com/6033-1/
16
reference_url https://usn.ubuntu.com/6175-1/
reference_id USN-6175-1
reference_type
scores
url https://usn.ubuntu.com/6175-1/
17
reference_url https://usn.ubuntu.com/6186-1/
reference_id USN-6186-1
reference_type
scores
url https://usn.ubuntu.com/6186-1/
18
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
19
reference_url https://usn.ubuntu.com/6300-1/
reference_id USN-6300-1
reference_type
scores
url https://usn.ubuntu.com/6300-1/
20
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
21
reference_url https://usn.ubuntu.com/6311-1/
reference_id USN-6311-1
reference_type
scores
url https://usn.ubuntu.com/6311-1/
22
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
23
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
24
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
25
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
26
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
27
reference_url https://usn.ubuntu.com/6347-1/
reference_id USN-6347-1
reference_type
scores
url https://usn.ubuntu.com/6347-1/
28
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
fixed_packages
aliases CVE-2023-28466
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p3kq-83eq-kba4
5
url VCID-wudq-7hws-aqft
vulnerability_id VCID-wudq-7hws-aqft
summary kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39188.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39188.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39188
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04387
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04411
published_at 2026-04-18T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04422
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04457
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04475
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04467
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04452
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04435
published_at 2026-04-13T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04403
published_at 2026-04-16T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04546
published_at 2026-04-21T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04578
published_at 2026-04-24T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04597
published_at 2026-04-26T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04642
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39188
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2130141
reference_id 2130141
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2130141
21
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
22
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
23
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
24
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
25
reference_url https://access.redhat.com/errata/RHSA-2023:3388
reference_id RHSA-2023:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3388
26
reference_url https://access.redhat.com/errata/RHSA-2023:4801
reference_id RHSA-2023:4801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4801
27
reference_url https://access.redhat.com/errata/RHSA-2023:4814
reference_id RHSA-2023:4814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4814
28
reference_url https://usn.ubuntu.com/5790-1/
reference_id USN-5790-1
reference_type
scores
url https://usn.ubuntu.com/5790-1/
29
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
30
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
31
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
32
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
33
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
34
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
35
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
36
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
37
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
38
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-39188
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wudq-7hws-aqft
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-70.70.1%3Farch=el9_0