Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/redhat-virtualization-host@4.5.3-202306050942_8?arch=6
Typerpm
Namespaceredhat
Nameredhat-virtualization-host
Version4.5.3-202306050942_8
Qualifiers
arch 6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-5cd3-497h-qkhw
vulnerability_id VCID-5cd3-497h-qkhw
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38023.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38023.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38023
reference_id
reference_type
scores
0
value 0.00354
scoring_system epss
scoring_elements 0.57787
published_at 2026-04-09T12:55:00Z
1
value 0.00354
scoring_system epss
scoring_elements 0.57785
published_at 2026-04-08T12:55:00Z
2
value 0.00354
scoring_system epss
scoring_elements 0.57804
published_at 2026-04-11T12:55:00Z
3
value 0.00354
scoring_system epss
scoring_elements 0.57782
published_at 2026-04-12T12:55:00Z
4
value 0.00354
scoring_system epss
scoring_elements 0.57761
published_at 2026-04-13T12:55:00Z
5
value 0.00354
scoring_system epss
scoring_elements 0.57789
published_at 2026-04-16T12:55:00Z
6
value 0.00354
scoring_system epss
scoring_elements 0.57735
published_at 2026-04-02T12:55:00Z
7
value 0.00354
scoring_system epss
scoring_elements 0.57757
published_at 2026-04-04T12:55:00Z
8
value 0.00354
scoring_system epss
scoring_elements 0.5773
published_at 2026-04-07T12:55:00Z
9
value 0.00481
scoring_system epss
scoring_elements 0.65149
published_at 2026-04-24T12:55:00Z
10
value 0.00481
scoring_system epss
scoring_elements 0.6515
published_at 2026-04-18T12:55:00Z
11
value 0.00481
scoring_system epss
scoring_elements 0.65134
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38023
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2154362
reference_id 2154362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2154362
5
reference_url https://security.archlinux.org/AVG-2828
reference_id AVG-2828
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2828
6
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
7
reference_url https://access.redhat.com/errata/RHSA-2023:0637
reference_id RHSA-2023:0637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0637
8
reference_url https://access.redhat.com/errata/RHSA-2023:0638
reference_id RHSA-2023:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0638
9
reference_url https://access.redhat.com/errata/RHSA-2023:0639
reference_id RHSA-2023:0639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0639
10
reference_url https://access.redhat.com/errata/RHSA-2023:0838
reference_id RHSA-2023:0838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0838
11
reference_url https://access.redhat.com/errata/RHSA-2023:1090
reference_id RHSA-2023:1090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1090
12
reference_url https://access.redhat.com/errata/RHSA-2023:2127
reference_id RHSA-2023:2127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2127
13
reference_url https://access.redhat.com/errata/RHSA-2023:2136
reference_id RHSA-2023:2136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2136
14
reference_url https://access.redhat.com/errata/RHSA-2023:2137
reference_id RHSA-2023:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2137
15
reference_url https://access.redhat.com/errata/RHSA-2023:3491
reference_id RHSA-2023:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3491
16
reference_url https://usn.ubuntu.com/5822-1/
reference_id USN-5822-1
reference_type
scores
url https://usn.ubuntu.com/5822-1/
17
reference_url https://usn.ubuntu.com/5936-1/
reference_id USN-5936-1
reference_type
scores
url https://usn.ubuntu.com/5936-1/
fixed_packages
aliases CVE-2022-38023
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5cd3-497h-qkhw
1
url VCID-8834-7b7n-a7f1
vulnerability_id VCID-8834-7b7n-a7f1
summary kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4378.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4378
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07917
published_at 2026-04-24T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07958
published_at 2026-04-21T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.08953
published_at 2026-04-18T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09039
published_at 2026-04-02T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.0909
published_at 2026-04-04T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09014
published_at 2026-04-07T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09093
published_at 2026-04-08T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09124
published_at 2026-04-09T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09125
published_at 2026-04-11T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09094
published_at 2026-04-12T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.0908
published_at 2026-04-13T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.08975
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://seclists.org/oss-sec/2022/q4/178
reference_id 178
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url https://seclists.org/oss-sec/2022/q4/178
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2152548
reference_id 2152548
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2152548
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
reference_id Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
11
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-avoid-integer-type-confusion-in-get_proc_long.patch
reference_id proc-avoid-integer-type-confusion-in-get_proc_long.patch
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-avoid-integer-type-confusion-in-get_proc_long.patch
12
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch
reference_id proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch
13
reference_url https://access.redhat.com/errata/RHSA-2023:0856
reference_id RHSA-2023:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0856
14
reference_url https://access.redhat.com/errata/RHSA-2023:0858
reference_id RHSA-2023:0858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0858
15
reference_url https://access.redhat.com/errata/RHSA-2023:0944
reference_id RHSA-2023:0944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0944
16
reference_url https://access.redhat.com/errata/RHSA-2023:0945
reference_id RHSA-2023:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0945
17
reference_url https://access.redhat.com/errata/RHSA-2023:0951
reference_id RHSA-2023:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0951
18
reference_url https://access.redhat.com/errata/RHSA-2023:0979
reference_id RHSA-2023:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0979
19
reference_url https://access.redhat.com/errata/RHSA-2023:1008
reference_id RHSA-2023:1008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1008
20
reference_url https://access.redhat.com/errata/RHSA-2023:1091
reference_id RHSA-2023:1091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1091
21
reference_url https://access.redhat.com/errata/RHSA-2023:1092
reference_id RHSA-2023:1092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1092
22
reference_url https://access.redhat.com/errata/RHSA-2023:1101
reference_id RHSA-2023:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1101
23
reference_url https://access.redhat.com/errata/RHSA-2023:1103
reference_id RHSA-2023:1103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1103
24
reference_url https://access.redhat.com/errata/RHSA-2023:1109
reference_id RHSA-2023:1109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1109
25
reference_url https://access.redhat.com/errata/RHSA-2023:1110
reference_id RHSA-2023:1110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1110
26
reference_url https://access.redhat.com/errata/RHSA-2023:1202
reference_id RHSA-2023:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1202
27
reference_url https://access.redhat.com/errata/RHSA-2023:1203
reference_id RHSA-2023:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1203
28
reference_url https://access.redhat.com/errata/RHSA-2023:1220
reference_id RHSA-2023:1220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1220
29
reference_url https://access.redhat.com/errata/RHSA-2023:1221
reference_id RHSA-2023:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1221
30
reference_url https://access.redhat.com/errata/RHSA-2023:1251
reference_id RHSA-2023:1251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1251
31
reference_url https://access.redhat.com/errata/RHSA-2023:1435
reference_id RHSA-2023:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1435
32
reference_url https://access.redhat.com/errata/RHSA-2023:1566
reference_id RHSA-2023:1566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1566
33
reference_url https://access.redhat.com/errata/RHSA-2023:1584
reference_id RHSA-2023:1584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1584
34
reference_url https://access.redhat.com/errata/RHSA-2023:1659
reference_id RHSA-2023:1659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1659
35
reference_url https://access.redhat.com/errata/RHSA-2023:1705
reference_id RHSA-2023:1705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1705
36
reference_url https://access.redhat.com/errata/RHSA-2023:1706
reference_id RHSA-2023:1706
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1706
37
reference_url https://access.redhat.com/errata/RHSA-2023:1822
reference_id RHSA-2023:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1822
38
reference_url https://access.redhat.com/errata/RHSA-2023:3388
reference_id RHSA-2023:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3388
39
reference_url https://access.redhat.com/errata/RHSA-2023:3431
reference_id RHSA-2023:3431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3431
40
reference_url https://access.redhat.com/errata/RHSA-2023:3491
reference_id RHSA-2023:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3491
41
reference_url https://usn.ubuntu.com/5799-1/
reference_id USN-5799-1
reference_type
scores
url https://usn.ubuntu.com/5799-1/
42
reference_url https://usn.ubuntu.com/5803-1/
reference_id USN-5803-1
reference_type
scores
url https://usn.ubuntu.com/5803-1/
43
reference_url https://usn.ubuntu.com/5809-1/
reference_id USN-5809-1
reference_type
scores
url https://usn.ubuntu.com/5809-1/
44
reference_url https://usn.ubuntu.com/5814-1/
reference_id USN-5814-1
reference_type
scores
url https://usn.ubuntu.com/5814-1/
45
reference_url https://usn.ubuntu.com/5831-1/
reference_id USN-5831-1
reference_type
scores
url https://usn.ubuntu.com/5831-1/
46
reference_url https://usn.ubuntu.com/5832-1/
reference_id USN-5832-1
reference_type
scores
url https://usn.ubuntu.com/5832-1/
47
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
48
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
49
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
50
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
51
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
52
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
fixed_packages
aliases CVE-2022-4378
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8834-7b7n-a7f1
2
url VCID-hqgh-ak7y-v7dx
vulnerability_id VCID-hqgh-ak7y-v7dx
summary kernel: mm/mremap.c use-after-free vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41222.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41222.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41222
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05244
published_at 2026-04-24T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05069
published_at 2026-04-02T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05096
published_at 2026-04-04T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05118
published_at 2026-04-07T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05151
published_at 2026-04-08T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05169
published_at 2026-04-09T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05143
published_at 2026-04-11T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05126
published_at 2026-04-12T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05112
published_at 2026-04-13T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05058
published_at 2026-04-16T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05064
published_at 2026-04-18T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05213
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41222
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2138818
reference_id 2138818
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2138818
5
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
reference_id ChangeLog-5.13.3
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-28T15:27:34Z/
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
6
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=2347
reference_id detail?id=2347
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-28T15:27:34Z/
url https://bugs.chromium.org/p/project-zero/issues/detail?id=2347
7
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2
reference_id ?id=97113eb39fa7972722ff490b947d8af023e1f6a2
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-28T15:27:34Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2
8
reference_url http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html
reference_id Kernel-Live-Patch-Security-Notice-LNS-0091-1.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-28T15:27:34Z/
url http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html
9
reference_url http://packetstormsecurity.com/files/168466/Linux-Stable-5.4-5.10-Use-After-Free-Race-Condition.html
reference_id Linux-Stable-5.4-5.10-Use-After-Free-Race-Condition.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-28T15:27:34Z/
url http://packetstormsecurity.com/files/168466/Linux-Stable-5.4-5.10-Use-After-Free-Race-Condition.html
10
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-28T15:27:34Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
11
reference_url https://security.netapp.com/advisory/ntap-20230214-0008/
reference_id ntap-20230214-0008
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-28T15:27:34Z/
url https://security.netapp.com/advisory/ntap-20230214-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2023:0832
reference_id RHSA-2023:0832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0832
13
reference_url https://access.redhat.com/errata/RHSA-2023:0839
reference_id RHSA-2023:0839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0839
14
reference_url https://access.redhat.com/errata/RHSA-2023:0854
reference_id RHSA-2023:0854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0854
15
reference_url https://access.redhat.com/errata/RHSA-2023:1130
reference_id RHSA-2023:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1130
16
reference_url https://access.redhat.com/errata/RHSA-2023:1192
reference_id RHSA-2023:1192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1192
17
reference_url https://access.redhat.com/errata/RHSA-2023:3491
reference_id RHSA-2023:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3491
18
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
19
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
20
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
fixed_packages
aliases CVE-2022-41222
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hqgh-ak7y-v7dx
3
url VCID-m4wy-164p-qyh7
vulnerability_id VCID-m4wy-164p-qyh7
summary kernel: net/ulp: use-after-free in listening ULP sockets
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0461.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0461.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0461
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.32927
published_at 2026-04-02T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32963
published_at 2026-04-04T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32784
published_at 2026-04-07T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32832
published_at 2026-04-08T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32861
published_at 2026-04-09T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32862
published_at 2026-04-11T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32823
published_at 2026-04-12T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32798
published_at 2026-04-13T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32841
published_at 2026-04-16T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32818
published_at 2026-04-18T12:55:00Z
10
value 0.00144
scoring_system epss
scoring_elements 0.34683
published_at 2026-04-21T12:55:00Z
11
value 0.00144
scoring_system epss
scoring_elements 0.3445
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0461
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2176192
reference_id 2176192
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2176192
5
reference_url https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c
reference_id #2c02d41d71f90a5168391b6a5f2954112ba2307c
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/
url https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
reference_id ?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
9
reference_url https://access.redhat.com/errata/RHSA-2023:1556
reference_id RHSA-2023:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1556
10
reference_url https://access.redhat.com/errata/RHSA-2023:1557
reference_id RHSA-2023:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1557
11
reference_url https://access.redhat.com/errata/RHSA-2023:1662
reference_id RHSA-2023:1662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1662
12
reference_url https://access.redhat.com/errata/RHSA-2023:1841
reference_id RHSA-2023:1841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1841
13
reference_url https://access.redhat.com/errata/RHSA-2023:1923
reference_id RHSA-2023:1923
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1923
14
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
15
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
16
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
17
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
18
reference_url https://access.redhat.com/errata/RHSA-2023:3190
reference_id RHSA-2023:3190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3190
19
reference_url https://access.redhat.com/errata/RHSA-2023:3191
reference_id RHSA-2023:3191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3191
20
reference_url https://access.redhat.com/errata/RHSA-2023:3465
reference_id RHSA-2023:3465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3465
21
reference_url https://access.redhat.com/errata/RHSA-2023:3470
reference_id RHSA-2023:3470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3470
22
reference_url https://access.redhat.com/errata/RHSA-2023:3490
reference_id RHSA-2023:3490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3490
23
reference_url https://access.redhat.com/errata/RHSA-2023:3491
reference_id RHSA-2023:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3491
24
reference_url https://access.redhat.com/errata/RHSA-2023:4125
reference_id RHSA-2023:4125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4125
25
reference_url https://access.redhat.com/errata/RHSA-2023:4126
reference_id RHSA-2023:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4126
26
reference_url https://access.redhat.com/errata/RHSA-2023:4146
reference_id RHSA-2023:4146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4146
27
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
28
reference_url https://usn.ubuntu.com/5911-1/
reference_id USN-5911-1
reference_type
scores
url https://usn.ubuntu.com/5911-1/
29
reference_url https://usn.ubuntu.com/5912-1/
reference_id USN-5912-1
reference_type
scores
url https://usn.ubuntu.com/5912-1/
30
reference_url https://usn.ubuntu.com/5913-1/
reference_id USN-5913-1
reference_type
scores
url https://usn.ubuntu.com/5913-1/
31
reference_url https://usn.ubuntu.com/5914-1/
reference_id USN-5914-1
reference_type
scores
url https://usn.ubuntu.com/5914-1/
32
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
33
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
34
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
35
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
36
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
37
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
38
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
39
reference_url https://usn.ubuntu.com/5929-1/
reference_id USN-5929-1
reference_type
scores
url https://usn.ubuntu.com/5929-1/
40
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
41
reference_url https://usn.ubuntu.com/5935-1/
reference_id USN-5935-1
reference_type
scores
url https://usn.ubuntu.com/5935-1/
42
reference_url https://usn.ubuntu.com/5938-1/
reference_id USN-5938-1
reference_type
scores
url https://usn.ubuntu.com/5938-1/
43
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
44
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
45
reference_url https://usn.ubuntu.com/5941-1/
reference_id USN-5941-1
reference_type
scores
url https://usn.ubuntu.com/5941-1/
46
reference_url https://usn.ubuntu.com/5950-1/
reference_id USN-5950-1
reference_type
scores
url https://usn.ubuntu.com/5950-1/
47
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
48
reference_url https://usn.ubuntu.com/5962-1/
reference_id USN-5962-1
reference_type
scores
url https://usn.ubuntu.com/5962-1/
49
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
50
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
51
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
52
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
fixed_packages
aliases CVE-2023-0461
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m4wy-164p-qyh7
4
url VCID-pphs-rtxe-wfca
vulnerability_id VCID-pphs-rtxe-wfca
summary kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3564.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3564.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3564
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25131
published_at 2026-04-24T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25302
published_at 2026-04-11T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.2526
published_at 2026-04-12T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25207
published_at 2026-04-18T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25217
published_at 2026-04-16T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25178
published_at 2026-04-21T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25362
published_at 2026-04-02T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25398
published_at 2026-04-04T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25174
published_at 2026-04-07T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25243
published_at 2026-04-08T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25288
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3564
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150999
reference_id 2150999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2150999
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:0856
reference_id RHSA-2023:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0856
10
reference_url https://access.redhat.com/errata/RHSA-2023:0858
reference_id RHSA-2023:0858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0858
11
reference_url https://access.redhat.com/errata/RHSA-2023:0951
reference_id RHSA-2023:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0951
12
reference_url https://access.redhat.com/errata/RHSA-2023:0979
reference_id RHSA-2023:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0979
13
reference_url https://access.redhat.com/errata/RHSA-2023:1008
reference_id RHSA-2023:1008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1008
14
reference_url https://access.redhat.com/errata/RHSA-2023:1202
reference_id RHSA-2023:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1202
15
reference_url https://access.redhat.com/errata/RHSA-2023:1203
reference_id RHSA-2023:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1203
16
reference_url https://access.redhat.com/errata/RHSA-2023:1220
reference_id RHSA-2023:1220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1220
17
reference_url https://access.redhat.com/errata/RHSA-2023:1221
reference_id RHSA-2023:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1221
18
reference_url https://access.redhat.com/errata/RHSA-2023:1251
reference_id RHSA-2023:1251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1251
19
reference_url https://access.redhat.com/errata/RHSA-2023:1435
reference_id RHSA-2023:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1435
20
reference_url https://access.redhat.com/errata/RHSA-2023:1559
reference_id RHSA-2023:1559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1559
21
reference_url https://access.redhat.com/errata/RHSA-2023:1560
reference_id RHSA-2023:1560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1560
22
reference_url https://access.redhat.com/errata/RHSA-2023:1666
reference_id RHSA-2023:1666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1666
23
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
24
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
25
reference_url https://access.redhat.com/errata/RHSA-2023:3277
reference_id RHSA-2023:3277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3277
26
reference_url https://access.redhat.com/errata/RHSA-2023:3278
reference_id RHSA-2023:3278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3278
27
reference_url https://access.redhat.com/errata/RHSA-2023:3388
reference_id RHSA-2023:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3388
28
reference_url https://access.redhat.com/errata/RHSA-2023:3431
reference_id RHSA-2023:3431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3431
29
reference_url https://access.redhat.com/errata/RHSA-2023:3491
reference_id RHSA-2023:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3491
30
reference_url https://access.redhat.com/errata/RHSA-2023:4020
reference_id RHSA-2023:4020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4020
31
reference_url https://access.redhat.com/errata/RHSA-2023:4021
reference_id RHSA-2023:4021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4021
32
reference_url https://access.redhat.com/errata/RHSA-2023:4150
reference_id RHSA-2023:4150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4150
33
reference_url https://access.redhat.com/errata/RHSA-2023:4151
reference_id RHSA-2023:4151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4151
34
reference_url https://access.redhat.com/errata/RHSA-2023:4215
reference_id RHSA-2023:4215
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4215
35
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
36
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
37
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
38
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
39
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
40
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
41
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
42
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
43
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
44
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
45
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
46
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
47
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
48
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
fixed_packages
aliases CVE-2022-3564
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pphs-rtxe-wfca
5
url VCID-sq5h-zx4v-67hm
vulnerability_id VCID-sq5h-zx4v-67hm
summary Multiple denial of service vulnerabilites have been found in Open vSwitch.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1668.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1668.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1668
reference_id
reference_type
scores
0
value 0.00245
scoring_system epss
scoring_elements 0.47745
published_at 2026-04-24T12:55:00Z
1
value 0.0032
scoring_system epss
scoring_elements 0.55056
published_at 2026-04-02T12:55:00Z
2
value 0.0032
scoring_system epss
scoring_elements 0.55081
published_at 2026-04-04T12:55:00Z
3
value 0.0032
scoring_system epss
scoring_elements 0.55057
published_at 2026-04-07T12:55:00Z
4
value 0.0032
scoring_system epss
scoring_elements 0.55107
published_at 2026-04-08T12:55:00Z
5
value 0.0032
scoring_system epss
scoring_elements 0.55106
published_at 2026-04-09T12:55:00Z
6
value 0.0032
scoring_system epss
scoring_elements 0.55118
published_at 2026-04-16T12:55:00Z
7
value 0.0032
scoring_system epss
scoring_elements 0.55098
published_at 2026-04-12T12:55:00Z
8
value 0.0032
scoring_system epss
scoring_elements 0.5508
published_at 2026-04-13T12:55:00Z
9
value 0.0032
scoring_system epss
scoring_elements 0.55122
published_at 2026-04-18T12:55:00Z
10
value 0.0032
scoring_system epss
scoring_elements 0.55102
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1668
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1668
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034042
reference_id 1034042
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034042
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2137666
reference_id 2137666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2137666
6
reference_url https://security.gentoo.org/glsa/202311-16
reference_id GLSA-202311-16
reference_type
scores
url https://security.gentoo.org/glsa/202311-16
7
reference_url https://access.redhat.com/errata/RHSA-2023:1765
reference_id RHSA-2023:1765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1765
8
reference_url https://access.redhat.com/errata/RHSA-2023:1766
reference_id RHSA-2023:1766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1766
9
reference_url https://access.redhat.com/errata/RHSA-2023:1769
reference_id RHSA-2023:1769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1769
10
reference_url https://access.redhat.com/errata/RHSA-2023:1770
reference_id RHSA-2023:1770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1770
11
reference_url https://access.redhat.com/errata/RHSA-2023:1823
reference_id RHSA-2023:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1823
12
reference_url https://access.redhat.com/errata/RHSA-2023:1824
reference_id RHSA-2023:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1824
13
reference_url https://access.redhat.com/errata/RHSA-2023:3491
reference_id RHSA-2023:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3491
14
reference_url https://usn.ubuntu.com/6068-1/
reference_id USN-6068-1
reference_type
scores
url https://usn.ubuntu.com/6068-1/
fixed_packages
aliases CVE-2023-1668
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sq5h-zx4v-67hm
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.5.3-202306050942_8%3Farch=6