Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-ms42-54h5-2kfa
Vulnerability ID VCID-ms42-54h5-2kfa
Aliases CVE-2022-0330
Summary kernel: possible privileges escalation due to missing TLB flush
Status Published
Exploitability 0.5
Weighted Severity 6.3
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json
https://api.first.org/data/v1/epss?cve=CVE-2022-0330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2042404 https://bugzilla.redhat.com/show_bug.cgi?id=2042404
RHSA-2022:0592 https://access.redhat.com/errata/RHSA-2022:0592
RHSA-2022:0620 https://access.redhat.com/errata/RHSA-2022:0620
RHSA-2022:0622 https://access.redhat.com/errata/RHSA-2022:0622
RHSA-2022:0712 https://access.redhat.com/errata/RHSA-2022:0712
RHSA-2022:0718 https://access.redhat.com/errata/RHSA-2022:0718
RHSA-2022:0771 https://access.redhat.com/errata/RHSA-2022:0771
RHSA-2022:0772 https://access.redhat.com/errata/RHSA-2022:0772
RHSA-2022:0777 https://access.redhat.com/errata/RHSA-2022:0777
RHSA-2022:0819 https://access.redhat.com/errata/RHSA-2022:0819
RHSA-2022:0820 https://access.redhat.com/errata/RHSA-2022:0820
RHSA-2022:0821 https://access.redhat.com/errata/RHSA-2022:0821
RHSA-2022:0823 https://access.redhat.com/errata/RHSA-2022:0823
RHSA-2022:0825 https://access.redhat.com/errata/RHSA-2022:0825
RHSA-2022:0841 https://access.redhat.com/errata/RHSA-2022:0841
RHSA-2022:0849 https://access.redhat.com/errata/RHSA-2022:0849
RHSA-2022:0851 https://access.redhat.com/errata/RHSA-2022:0851
RHSA-2022:0925 https://access.redhat.com/errata/RHSA-2022:0925
RHSA-2022:0958 https://access.redhat.com/errata/RHSA-2022:0958
RHSA-2022:1103 https://access.redhat.com/errata/RHSA-2022:1103
RHSA-2022:1104 https://access.redhat.com/errata/RHSA-2022:1104
RHSA-2022:1106 https://access.redhat.com/errata/RHSA-2022:1106
RHSA-2022:1107 https://access.redhat.com/errata/RHSA-2022:1107
RHSA-2022:1263 https://access.redhat.com/errata/RHSA-2022:1263
USN-5278-1 https://usn.ubuntu.com/5278-1/
USN-5294-1 https://usn.ubuntu.com/5294-1/
USN-5294-2 https://usn.ubuntu.com/5294-2/
USN-5295-1 https://usn.ubuntu.com/5295-1/
USN-5295-2 https://usn.ubuntu.com/5295-2/
USN-5297-1 https://usn.ubuntu.com/5297-1/
USN-5298-1 https://usn.ubuntu.com/5298-1/
USN-5362-1 https://usn.ubuntu.com/5362-1/
USN-5505-1 https://usn.ubuntu.com/5505-1/
USN-5513-1 https://usn.ubuntu.com/5513-1/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.11564
EPSS Score 0.00039
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:59:49.186101+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json 38.0.0