Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/370930?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/370930?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.0.12-1", "type": "alpm", "namespace": "archlinux", "name": "linux-zen", "version": "6.0.12-1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "6.2-1", "latest_non_vulnerable_version": "6.2-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78802?format=api", "vulnerability_id": "VCID-2na9-p1ae-2bdc", "summary": "kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4379.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4379.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4379", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.57974", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58017", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58039", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58015", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.5807", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58073", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58089", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58067", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58046", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58076", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58053", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58019", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58033", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4379" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4379", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4379" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://seclists.org/oss-sec/2022/q4/185", "reference_id": "185", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/" } ], "url": "https://seclists.org/oss-sec/2022/q4/185" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152807", "reference_id": "2152807", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152807" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0", "reference_id": "?id=75333d48f92256a0dec91dbf07835e804fc411c0", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da", "reference_id": "?id=aeba12b26c79fc35e07e511f692a8907037d95da", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/", "reference_id": "LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", "reference_id": "msg00005.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/", "reference_id": "RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0951", "reference_id": "RHSA-2023:0951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0979", "reference_id": "RHSA-2023:0979", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0979" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1008", "reference_id": "RHSA-2023:1008", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1008" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1202", "reference_id": "RHSA-2023:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1203", "reference_id": "RHSA-2023:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1435", "reference_id": "RHSA-2023:1435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1435" }, { "reference_url": "https://usn.ubuntu.com/5911-1/", "reference_id": "USN-5911-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5911-1/" }, { "reference_url": "https://usn.ubuntu.com/5912-1/", "reference_id": "USN-5912-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5912-1/" }, { "reference_url": "https://usn.ubuntu.com/5913-1/", "reference_id": "USN-5913-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5913-1/" }, { "reference_url": "https://usn.ubuntu.com/5914-1/", "reference_id": "USN-5914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5914-1/" }, { "reference_url": "https://usn.ubuntu.com/5915-1/", "reference_id": "USN-5915-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5915-1/" }, { "reference_url": "https://usn.ubuntu.com/5929-1/", "reference_id": "USN-5929-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5929-1/" }, { "reference_url": "https://usn.ubuntu.com/5935-1/", "reference_id": "USN-5935-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5935-1/" }, { "reference_url": "https://usn.ubuntu.com/5938-1/", "reference_id": "USN-5938-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5938-1/" }, { "reference_url": "https://usn.ubuntu.com/5941-1/", "reference_id": "USN-5941-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5941-1/" }, { "reference_url": "https://usn.ubuntu.com/5950-1/", "reference_id": "USN-5950-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5950-1/" }, { "reference_url": "https://usn.ubuntu.com/5962-1/", "reference_id": "USN-5962-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5962-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-4379" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2na9-p1ae-2bdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78836?format=api", "vulnerability_id": "VCID-369a-xh7h-9uca", "summary": "kernel: usb: use-after-free write in put_dev", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4382.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4382.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4382", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08475", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08444", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08337", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0832", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08446", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08411", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0838", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08333", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08421", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08474", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08394", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08466", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08484", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08479", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08458", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4382" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4382" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182440", "reference_id": "2182440", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182440" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2022/12/14/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-09T15:33:38Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2022/12/14/5" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5970-1/", "reference_id": "USN-5970-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5970-1/" }, { "reference_url": "https://usn.ubuntu.com/5978-1/", "reference_id": "USN-5978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5978-1/" }, { "reference_url": "https://usn.ubuntu.com/5979-1/", "reference_id": "USN-5979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5979-1/" }, { "reference_url": "https://usn.ubuntu.com/5980-1/", "reference_id": "USN-5980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5980-1/" }, { "reference_url": "https://usn.ubuntu.com/5982-1/", "reference_id": "USN-5982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5982-1/" }, { "reference_url": "https://usn.ubuntu.com/5985-1/", "reference_id": "USN-5985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5985-1/" }, { "reference_url": "https://usn.ubuntu.com/5987-1/", "reference_id": "USN-5987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5987-1/" }, { "reference_url": "https://usn.ubuntu.com/6004-1/", "reference_id": "USN-6004-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6004-1/" }, { "reference_url": "https://usn.ubuntu.com/6020-1/", "reference_id": "USN-6020-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6020-1/" }, { "reference_url": "https://usn.ubuntu.com/6031-1/", "reference_id": "USN-6031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6031-1/" }, { "reference_url": "https://usn.ubuntu.com/6032-1/", "reference_id": "USN-6032-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6032-1/" }, { "reference_url": "https://usn.ubuntu.com/6151-1/", "reference_id": "USN-6151-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6151-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-4382" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-369a-xh7h-9uca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78715?format=api", "vulnerability_id": "VCID-3ad4-u98h-mqf6", "summary": "kernel: hid: use-after-free in bigben_set_led()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25012.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25012.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25012", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07912", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.0796", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07978", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.0799", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07969", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07902", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07849", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07863", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07945", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08627", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08693", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0869", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08723", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12762", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25012" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/02/02/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/02/02/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/11/05/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/11/05/1" }, { "reference_url": "https://lore.kernel.org/all/20230125-hid-unregister-leds-v1-1-9a5192dcef16%40diag.uniroma1.it/", "reference_id": "20230125-hid-unregister-leds-v1-1-9a5192dcef16%40diag.uniroma1.it", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/" } ], "url": "https://lore.kernel.org/all/20230125-hid-unregister-leds-v1-1-9a5192dcef16%40diag.uniroma1.it/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172948", "reference_id": "2172948", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172948" }, { "reference_url": "https://seclists.org/oss-sec/2023/q1/53", "reference_id": "53", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/" } ], "url": "https://seclists.org/oss-sec/2023/q1/53" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=27d2a2fd844ec7da70d19fabb482304fd1e0595b", "reference_id": "?id=27d2a2fd844ec7da70d19fabb482304fd1e0595b", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/" } ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=27d2a2fd844ec7da70d19fabb482304fd1e0595b" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=76ca8da989c7d97a7f76c75d475fe95a584439d7", "reference_id": "?id=76ca8da989c7d97a7f76c75d475fe95a584439d7", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/" } ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=76ca8da989c7d97a7f76c75d475fe95a584439d7" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9fefb6201c4f8dd9f58c581b2a66e5cde2895ea2", "reference_id": "?id=9fefb6201c4f8dd9f58c581b2a66e5cde2895ea2", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/" } ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9fefb6201c4f8dd9f58c581b2a66e5cde2895ea2" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", "reference_id": "msg00005.html", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" }, { "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1207560", "reference_id": "show_bug.cgi?id=1207560", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/" } ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1207560" }, { "reference_url": "https://usn.ubuntu.com/6033-1/", "reference_id": "USN-6033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6033-1/" }, { "reference_url": "https://usn.ubuntu.com/6171-1/", "reference_id": "USN-6171-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6171-1/" }, { "reference_url": "https://usn.ubuntu.com/6172-1/", "reference_id": "USN-6172-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6172-1/" }, { "reference_url": "https://usn.ubuntu.com/6185-1/", "reference_id": "USN-6185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6185-1/" }, { "reference_url": "https://usn.ubuntu.com/6187-1/", "reference_id": "USN-6187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6187-1/" }, { "reference_url": "https://usn.ubuntu.com/6207-1/", "reference_id": "USN-6207-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6207-1/" }, { "reference_url": "https://usn.ubuntu.com/6222-1/", "reference_id": "USN-6222-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6222-1/" }, { "reference_url": "https://usn.ubuntu.com/6223-1/", "reference_id": "USN-6223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6223-1/" }, { "reference_url": "https://usn.ubuntu.com/6256-1/", "reference_id": "USN-6256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6256-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2023-25012" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ad4-u98h-mqf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79450?format=api", "vulnerability_id": "VCID-4ave-x8wb-f7fw", "summary": "kernel: insufficient TCP source port randomness leads to client identification", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32296.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32296.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32296", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16448", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16485", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16333", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1638", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16381", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16603", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16665", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16465", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16551", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16605", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16587", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16546", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16488", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16428", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17595", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20156", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096901", "reference_id": "2096901", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096901" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4128", "reference_id": "RHSA-2026:4128", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4128" }, { "reference_url": "https://usn.ubuntu.com/5616-1/", "reference_id": "USN-5616-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5616-1/" }, { "reference_url": "https://usn.ubuntu.com/5622-1/", "reference_id": "USN-5622-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5622-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5630-1/", "reference_id": "USN-5630-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5630-1/" }, { "reference_url": "https://usn.ubuntu.com/5639-1/", "reference_id": "USN-5639-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5639-1/" }, { "reference_url": "https://usn.ubuntu.com/5647-1/", "reference_id": "USN-5647-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5647-1/" }, { "reference_url": "https://usn.ubuntu.com/5654-1/", "reference_id": "USN-5654-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5654-1/" }, { "reference_url": "https://usn.ubuntu.com/5660-1/", "reference_id": "USN-5660-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5660-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-32296" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ave-x8wb-f7fw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78953?format=api", "vulnerability_id": "VCID-4gdy-gqe4-93f4", "summary": "Kernel: use-after-free in btf_dump_name_dups in tools/lib/bpf/btf_dump.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3534.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3534.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3534", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08567", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08526", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08521", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08485", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08474", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08421", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09269", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0932", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09235", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0931", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09353", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09364", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09336", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09322", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09213", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09212", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3534" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717", "reference_id": "1023717", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165706", "reference_id": "2165706", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165706" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://vuldb.com/?id.211032", "reference_id": "?id.211032", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:09:09Z/" } ], "url": "https://vuldb.com/?id.211032" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93c660ca40b5d2f7c1b1626e955a8e9fa30e0749", "reference_id": "?id=93c660ca40b5d2f7c1b1626e955a8e9fa30e0749", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:09:09Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93c660ca40b5d2f7c1b1626e955a8e9fa30e0749" }, { "reference_url": "https://usn.ubuntu.com/5759-1/", "reference_id": "USN-5759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5759-1/" }, { "reference_url": "https://usn.ubuntu.com/6215-1/", "reference_id": "USN-6215-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6215-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-5759-2/", "reference_id": "USN-USN-5759-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5759-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3534" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4gdy-gqe4-93f4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78893?format=api", "vulnerability_id": "VCID-4nqf-ct5y-6uev", "summary": "kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42896", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61955", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62004", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61994", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61973", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62015", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62021", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62003", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62017", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.6201", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61916", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61946", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61966", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61983", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42896" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147364", "reference_id": "2147364", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147364" }, { "reference_url": "https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4", "reference_id": "#711f8c3fb3db61897080468586b970c87c61d9e4", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/" } ], "url": "https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4" }, { "reference_url": "https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4", "reference_id": "711f8c3fb3db61897080468586b970c87c61d9e4", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/" } ], "url": "https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3461", "reference_id": "RHSA-2023:3461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3462", "reference_id": "RHSA-2023:3462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3517", "reference_id": "RHSA-2023:3517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4137", "reference_id": "RHSA-2023:4137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4138", "reference_id": "RHSA-2023:4138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4230", "reference_id": "RHSA-2023:4230", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4230" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4517", "reference_id": "RHSA-2023:4517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4531", "reference_id": "RHSA-2023:4531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4541", "reference_id": "RHSA-2023:4541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4888", "reference_id": "RHSA-2023:4888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5580", "reference_id": "RHSA-2023:5580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5588", "reference_id": "RHSA-2023:5588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5589", "reference_id": "RHSA-2023:5589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0980", "reference_id": "RHSA-2024:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1249", "reference_id": "RHSA-2024:1249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1323", "reference_id": "RHSA-2024:1323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1332", "reference_id": "RHSA-2024:1332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1746", "reference_id": "RHSA-2024:1746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1746" }, { "reference_url": "https://usn.ubuntu.com/5780-1/", "reference_id": "USN-5780-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5780-1/" }, { "reference_url": "https://usn.ubuntu.com/5783-1/", "reference_id": "USN-5783-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5783-1/" }, { "reference_url": "https://usn.ubuntu.com/5794-1/", "reference_id": "USN-5794-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5794-1/" }, { "reference_url": "https://usn.ubuntu.com/5802-1/", "reference_id": "USN-5802-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5802-1/" }, { "reference_url": "https://usn.ubuntu.com/5803-1/", "reference_id": "USN-5803-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5803-1/" }, { "reference_url": "https://usn.ubuntu.com/5804-1/", "reference_id": "USN-5804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5804-1/" }, { "reference_url": "https://usn.ubuntu.com/5804-2/", "reference_id": "USN-5804-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5804-2/" }, { "reference_url": "https://usn.ubuntu.com/5808-1/", "reference_id": "USN-5808-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5808-1/" }, { "reference_url": "https://usn.ubuntu.com/5809-1/", "reference_id": "USN-5809-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5809-1/" }, { "reference_url": "https://usn.ubuntu.com/5813-1/", "reference_id": "USN-5813-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5813-1/" }, { "reference_url": "https://usn.ubuntu.com/5814-1/", "reference_id": "USN-5814-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5814-1/" }, { "reference_url": "https://usn.ubuntu.com/5829-1/", "reference_id": "USN-5829-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5829-1/" }, { "reference_url": "https://usn.ubuntu.com/5830-1/", "reference_id": "USN-5830-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5830-1/" }, { "reference_url": "https://usn.ubuntu.com/5831-1/", "reference_id": "USN-5831-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5831-1/" }, { "reference_url": "https://usn.ubuntu.com/5832-1/", "reference_id": "USN-5832-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5832-1/" }, { "reference_url": "https://usn.ubuntu.com/5860-1/", "reference_id": "USN-5860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5860-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5863-1/", "reference_id": "USN-5863-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5863-1/" }, { "reference_url": "https://usn.ubuntu.com/5875-1/", "reference_id": "USN-5875-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5875-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5879-1/", "reference_id": "USN-5879-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5879-1/" }, { "reference_url": "https://usn.ubuntu.com/5914-1/", "reference_id": "USN-5914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5914-1/" }, { "reference_url": "https://usn.ubuntu.com/5918-1/", "reference_id": "USN-5918-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5918-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-42896" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4nqf-ct5y-6uev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79178?format=api", "vulnerability_id": "VCID-5149-phe6-eqh5", "summary": "kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36946.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36946.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36946", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05077", "scoring_system": "epss", "scoring_elements": "0.89852", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05077", "scoring_system": "epss", "scoring_elements": "0.8976", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05077", "scoring_system": "epss", "scoring_elements": "0.89775", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05077", "scoring_system": "epss", "scoring_elements": "0.89779", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05077", "scoring_system": "epss", "scoring_elements": "0.89796", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05077", "scoring_system": "epss", "scoring_elements": "0.89802", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05077", "scoring_system": "epss", "scoring_elements": "0.89809", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05077", "scoring_system": "epss", "scoring_elements": "0.89807", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05077", "scoring_system": "epss", "scoring_elements": "0.898", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05077", "scoring_system": "epss", "scoring_elements": "0.89814", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05077", "scoring_system": "epss", "scoring_elements": "0.89808", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05077", "scoring_system": "epss", "scoring_elements": "0.89823", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05077", "scoring_system": "epss", "scoring_elements": "0.89822", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05077", "scoring_system": "epss", "scoring_elements": "0.89836", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115278", "reference_id": "2115278", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115278" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5207", "reference_id": "dsa-5207", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5207" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164", "reference_id": "?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/" } ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164" }, { "reference_url": "https://marc.info/?l=netfilter-devel&m=165883202007292&w=2", "reference_id": "?l=netfilter-devel&m=165883202007292&w=2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/" } ], "url": "https://marc.info/?l=netfilter-devel&m=165883202007292&w=2" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220901-0007/", "reference_id": "ntap-20220901-0007", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220901-0007/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7444", "reference_id": "RHSA-2022:7444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7683", "reference_id": "RHSA-2022:7683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724", "reference_id": "RHSA-2024:0724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0724" }, { "reference_url": "https://usn.ubuntu.com/5580-1/", "reference_id": "USN-5580-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5580-1/" }, { "reference_url": "https://usn.ubuntu.com/5590-1/", "reference_id": "USN-5590-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5590-1/" }, { "reference_url": "https://usn.ubuntu.com/5621-1/", "reference_id": "USN-5621-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5621-1/" }, { "reference_url": "https://usn.ubuntu.com/5622-1/", "reference_id": "USN-5622-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5622-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5630-1/", "reference_id": "USN-5630-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5630-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5634-1/", "reference_id": "USN-5634-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5634-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5639-1/", "reference_id": "USN-5639-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5639-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5647-1/", "reference_id": "USN-5647-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5647-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5650-1/", "reference_id": "USN-5650-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5650-1/" }, { "reference_url": "https://usn.ubuntu.com/5652-1/", "reference_id": "USN-5652-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5652-1/" }, { "reference_url": "https://usn.ubuntu.com/5654-1/", "reference_id": "USN-5654-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5654-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5660-1/", "reference_id": "USN-5660-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5660-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-36946" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5149-phe6-eqh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79455?format=api", "vulnerability_id": "VCID-5c6z-1ebs-wfev", "summary": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1012.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1012.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1012", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53709", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53828", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.5373", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53757", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53782", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53811", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53796", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53833", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53837", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59328", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59347", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59332", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59338", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.5929", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00388", "scoring_system": "epss", "scoring_elements": "0.59936", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604", "reference_id": "2064604", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5214", "reference_id": "RHSA-2022:5214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5220", "reference_id": "RHSA-2022:5220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5224", "reference_id": "RHSA-2022:5224", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5224" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5249", "reference_id": "RHSA-2022:5249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5267", "reference_id": "RHSA-2022:5267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5626", "reference_id": "RHSA-2022:5626", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5626" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5633", "reference_id": "RHSA-2022:5633", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5633" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5636", "reference_id": "RHSA-2022:5636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5819", "reference_id": "RHSA-2022:5819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5834", "reference_id": "RHSA-2022:5834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6551", "reference_id": "RHSA-2022:6551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6551" }, { "reference_url": "https://usn.ubuntu.com/5471-1/", "reference_id": "USN-5471-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5471-1/" }, { "reference_url": "https://usn.ubuntu.com/5594-1/", "reference_id": "USN-5594-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5594-1/" }, { "reference_url": "https://usn.ubuntu.com/5599-1/", "reference_id": "USN-5599-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5599-1/" }, { "reference_url": "https://usn.ubuntu.com/5602-1/", "reference_id": "USN-5602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5602-1/" }, { "reference_url": "https://usn.ubuntu.com/5616-1/", "reference_id": "USN-5616-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5616-1/" }, { "reference_url": "https://usn.ubuntu.com/5622-1/", "reference_id": "USN-5622-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5622-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5630-1/", "reference_id": "USN-5630-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5630-1/" }, { "reference_url": "https://usn.ubuntu.com/5639-1/", "reference_id": "USN-5639-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5639-1/" }, { "reference_url": "https://usn.ubuntu.com/5647-1/", "reference_id": "USN-5647-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5647-1/" }, { "reference_url": "https://usn.ubuntu.com/5654-1/", "reference_id": "USN-5654-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5654-1/" }, { "reference_url": "https://usn.ubuntu.com/5660-1/", "reference_id": "USN-5660-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5660-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-1012" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5c6z-1ebs-wfev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79000?format=api", "vulnerability_id": "VCID-6y4w-3ftc-qkgs", "summary": "Kernel: A race between ufx_ops_open() and ufx_usb_disconnect() may result in UAF", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41849.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41849.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41849", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05887", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05809", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05845", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05839", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05878", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05904", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05877", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.0587", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05835", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05846", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06283", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06471", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07112", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07154", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07149", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07126", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41849" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41849" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135327", "reference_id": "2135327", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135327" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" }, { "reference_url": "https://usn.ubuntu.com/5851-1/", "reference_id": "USN-5851-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5851-1/" }, { "reference_url": "https://usn.ubuntu.com/5853-1/", "reference_id": "USN-5853-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5853-1/" }, { "reference_url": "https://usn.ubuntu.com/5854-1/", "reference_id": "USN-5854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5854-1/" }, { "reference_url": "https://usn.ubuntu.com/5860-1/", "reference_id": "USN-5860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5860-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5862-1/", "reference_id": "USN-5862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5862-1/" }, { "reference_url": "https://usn.ubuntu.com/5865-1/", "reference_id": "USN-5865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5865-1/" }, { "reference_url": "https://usn.ubuntu.com/5874-1/", "reference_id": "USN-5874-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5874-1/" }, { "reference_url": "https://usn.ubuntu.com/5875-1/", "reference_id": "USN-5875-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5875-1/" }, { "reference_url": "https://usn.ubuntu.com/5876-1/", "reference_id": "USN-5876-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5876-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5909-1/", "reference_id": "USN-5909-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5909-1/" }, { "reference_url": "https://usn.ubuntu.com/5918-1/", "reference_id": "USN-5918-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5918-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" }, { "reference_url": "https://usn.ubuntu.com/6031-1/", "reference_id": "USN-6031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-41849" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6y4w-3ftc-qkgs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79033?format=api", "vulnerability_id": "VCID-7crw-vbpf-w7dx", "summary": "kernel: leak of sensitive information due to uninitialized data in stex_queuecommand_lck() in drivers/scsi/stex.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40768.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40768.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40768", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03126", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03109", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03106", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03095", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03141", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03103", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03691", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03715", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03719", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03741", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03699", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03677", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03651", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03629", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0364", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03703", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40768" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40768", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40768" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128462", "reference_id": "2128462", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128462" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5693-1/", "reference_id": "USN-5693-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5693-1/" }, { "reference_url": "https://usn.ubuntu.com/5727-1/", "reference_id": "USN-5727-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-1/" }, { "reference_url": "https://usn.ubuntu.com/5727-2/", "reference_id": "USN-5727-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-2/" }, { "reference_url": "https://usn.ubuntu.com/5728-1/", "reference_id": "USN-5728-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-1/" }, { "reference_url": "https://usn.ubuntu.com/5728-2/", "reference_id": "USN-5728-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-2/" }, { "reference_url": "https://usn.ubuntu.com/5728-3/", "reference_id": "USN-5728-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-3/" }, { "reference_url": "https://usn.ubuntu.com/5729-1/", "reference_id": "USN-5729-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5729-1/" }, { "reference_url": "https://usn.ubuntu.com/5729-2/", "reference_id": "USN-5729-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5729-2/" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-40768" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7crw-vbpf-w7dx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78994?format=api", "vulnerability_id": "VCID-7dm1-5xf1-jkf7", "summary": "kernel: nilfs2: NULL pointer dereference in nilfs_bmap_lookup_at_level in fs/nilfs2/inode.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3621.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3621.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3621", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30192", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30638", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.3046", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30345", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30264", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30123", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42252", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42281", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42223", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42273", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42303", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42267", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42239", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4229", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42265", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3621", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3621" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140883", "reference_id": "2140883", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140883" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://vuldb.com/?id.211920", "reference_id": "?id.211920", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:09Z/" } ], "url": "https://vuldb.com/?id.211920" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=21a87d88c2253350e115029f14fe2a10a7e6c856", "reference_id": "?id=21a87d88c2253350e115029f14fe2a10a7e6c856", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:09Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=21a87d88c2253350e115029f14fe2a10a7e6c856" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html", "reference_id": "msg00001.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:09Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html", "reference_id": "msg00034.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:09Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html" }, { "reference_url": "https://usn.ubuntu.com/5754-1/", "reference_id": "USN-5754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-1/" }, { "reference_url": "https://usn.ubuntu.com/5754-2/", "reference_id": "USN-5754-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-2/" }, { "reference_url": "https://usn.ubuntu.com/5755-1/", "reference_id": "USN-5755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-1/" }, { "reference_url": "https://usn.ubuntu.com/5755-2/", "reference_id": "USN-5755-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-1/", "reference_id": "USN-5756-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-1/" }, { "reference_url": "https://usn.ubuntu.com/5756-2/", "reference_id": "USN-5756-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-3/", "reference_id": "USN-5756-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-3/" }, { "reference_url": "https://usn.ubuntu.com/5757-1/", "reference_id": "USN-5757-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-1/" }, { "reference_url": "https://usn.ubuntu.com/5757-2/", "reference_id": "USN-5757-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-2/" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5773-1/", "reference_id": "USN-5773-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5773-1/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" }, { "reference_url": "https://usn.ubuntu.com/5779-1/", "reference_id": "USN-5779-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5779-1/" }, { "reference_url": "https://usn.ubuntu.com/5789-1/", "reference_id": "USN-5789-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5789-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3621" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7dm1-5xf1-jkf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79645?format=api", "vulnerability_id": "VCID-7e2m-a86y-c3bd", "summary": "kernel: media: em28xx: initialize refcount before kref_get", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3239.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3239.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3239", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07568", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07455", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07588", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07549", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07539", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07509", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07504", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07466", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07505", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07487", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07546", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07554", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07542", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08767", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3239" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127985", "reference_id": "2127985", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127985" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://usn.ubuntu.com/5757-1/", "reference_id": "USN-5757-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-1/" }, { "reference_url": "https://usn.ubuntu.com/5757-2/", "reference_id": "USN-5757-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-2/" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3239" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7e2m-a86y-c3bd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78831?format=api", "vulnerability_id": "VCID-8834-7b7n-a7f1", "summary": "kernel: stack overflow in do_proc_dointvec and proc_skip_spaces", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4378.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4378.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4378", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07917", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07958", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07856", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07826", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07885", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09145", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09039", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0909", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09014", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09093", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09124", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09125", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09094", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0908", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.08975", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.08953", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://seclists.org/oss-sec/2022/q4/178", "reference_id": "178", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/" } ], "url": "https://seclists.org/oss-sec/2022/q4/178" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152548", "reference_id": "2152548", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152548" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html", "reference_id": "Kernel-Live-Patch-Security-Notice-LNS-0092-1.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/" } ], "url": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-avoid-integer-type-confusion-in-get_proc_long.patch", "reference_id": "proc-avoid-integer-type-confusion-in-get_proc_long.patch", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-avoid-integer-type-confusion-in-get_proc_long.patch" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch", "reference_id": "proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0856", "reference_id": "RHSA-2023:0856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0856" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0858", "reference_id": "RHSA-2023:0858", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0858" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0944", "reference_id": "RHSA-2023:0944", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0944" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0945", "reference_id": "RHSA-2023:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0951", "reference_id": "RHSA-2023:0951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0979", "reference_id": "RHSA-2023:0979", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0979" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1008", "reference_id": "RHSA-2023:1008", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1008" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1091", "reference_id": "RHSA-2023:1091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1092", "reference_id": "RHSA-2023:1092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1092" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1101", "reference_id": "RHSA-2023:1101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1103", "reference_id": "RHSA-2023:1103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1109", "reference_id": "RHSA-2023:1109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1110", "reference_id": "RHSA-2023:1110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1202", "reference_id": "RHSA-2023:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1203", "reference_id": "RHSA-2023:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1220", "reference_id": "RHSA-2023:1220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1221", "reference_id": "RHSA-2023:1221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1251", "reference_id": "RHSA-2023:1251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1251" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1435", "reference_id": "RHSA-2023:1435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1566", "reference_id": "RHSA-2023:1566", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1566" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1584", "reference_id": "RHSA-2023:1584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1659", "reference_id": "RHSA-2023:1659", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1659" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1705", "reference_id": "RHSA-2023:1705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1706", "reference_id": "RHSA-2023:1706", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1706" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1822", "reference_id": "RHSA-2023:1822", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1822" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3388", "reference_id": "RHSA-2023:3388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3431", "reference_id": "RHSA-2023:3431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3491", "reference_id": "RHSA-2023:3491", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3491" }, { "reference_url": "https://usn.ubuntu.com/5799-1/", "reference_id": "USN-5799-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5799-1/" }, { "reference_url": "https://usn.ubuntu.com/5803-1/", "reference_id": "USN-5803-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5803-1/" }, { "reference_url": "https://usn.ubuntu.com/5809-1/", "reference_id": "USN-5809-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5809-1/" }, { "reference_url": "https://usn.ubuntu.com/5814-1/", "reference_id": "USN-5814-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5814-1/" }, { "reference_url": "https://usn.ubuntu.com/5831-1/", "reference_id": "USN-5831-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5831-1/" }, { "reference_url": "https://usn.ubuntu.com/5832-1/", "reference_id": "USN-5832-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5832-1/" }, { "reference_url": "https://usn.ubuntu.com/5860-1/", "reference_id": "USN-5860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5860-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5879-1/", "reference_id": "USN-5879-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5879-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5919-1/", "reference_id": "USN-5919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5919-1/" }, { "reference_url": "https://usn.ubuntu.com/5920-1/", "reference_id": "USN-5920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5920-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-4378" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8834-7b7n-a7f1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78979?format=api", "vulnerability_id": "VCID-95yc-p1fc-7kea", "summary": "kernel: nilfs2: use-after-free in nilfs_new_inode of fs/nilfs2/inode.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3649.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3649.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3649", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21243", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21285", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21338", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21091", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21171", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21231", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.212", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21987", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23645", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23521", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23603", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23692", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23842", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23831", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23812", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23681", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3649" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140882", "reference_id": "2140882", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140882" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5792-1/", "reference_id": "USN-5792-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-1/" }, { "reference_url": "https://usn.ubuntu.com/5792-2/", "reference_id": "USN-5792-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" }, { "reference_url": "https://usn.ubuntu.com/5853-1/", "reference_id": "USN-5853-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5853-1/" }, { "reference_url": "https://usn.ubuntu.com/5854-1/", "reference_id": "USN-5854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5854-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5862-1/", "reference_id": "USN-5862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5862-1/" }, { "reference_url": "https://usn.ubuntu.com/5865-1/", "reference_id": "USN-5865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5865-1/" }, { "reference_url": "https://usn.ubuntu.com/5874-1/", "reference_id": "USN-5874-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5874-1/" }, { "reference_url": "https://usn.ubuntu.com/5875-1/", "reference_id": "USN-5875-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5875-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5909-1/", "reference_id": "USN-5909-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5909-1/" }, { "reference_url": "https://usn.ubuntu.com/5918-1/", "reference_id": "USN-5918-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5918-1/" }, { "reference_url": "https://usn.ubuntu.com/5919-1/", "reference_id": "USN-5919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5919-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/5976-1/", "reference_id": "USN-5976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5976-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3649" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-95yc-p1fc-7kea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78787?format=api", "vulnerability_id": "VCID-96bc-a364-8fd5", "summary": "kernel: improper input validation in handling of SMB2_TREE_CONNECT command can result in out-of-bounds read which could result in DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47938.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47938.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47938", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02822", "scoring_system": "epss", "scoring_elements": "0.86102", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02822", "scoring_system": "epss", "scoring_elements": "0.86148", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02822", "scoring_system": "epss", "scoring_elements": "0.86136", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02822", "scoring_system": "epss", "scoring_elements": "0.86117", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02822", "scoring_system": "epss", "scoring_elements": "0.86118", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04588", "scoring_system": "epss", "scoring_elements": "0.89292", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04588", "scoring_system": "epss", "scoring_elements": "0.89262", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04588", "scoring_system": "epss", "scoring_elements": "0.89266", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04588", "scoring_system": "epss", "scoring_elements": "0.89275", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04907", "scoring_system": "epss", "scoring_elements": "0.89611", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04907", "scoring_system": "epss", "scoring_elements": "0.89604", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04907", "scoring_system": "epss", "scoring_elements": "0.8961", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06103", "scoring_system": "epss", "scoring_elements": "0.90805", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06103", "scoring_system": "epss", "scoring_elements": "0.90814", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06103", "scoring_system": "epss", "scoring_elements": "0.90803", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47938" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/12/23/10", "reference_id": "10", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:19:29Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/12/23/10" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155947", "reference_id": "2155947", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155947" }, { "reference_url": "https://github.com/torvalds/linux/commit/824d4f64c20093275f72fc8101394d75ff6a249e", "reference_id": "824d4f64c20093275f72fc8101394d75ff6a249e", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:19:29Z/" } ], "url": "https://github.com/torvalds/linux/commit/824d4f64c20093275f72fc8101394d75ff6a249e" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2", "reference_id": "ChangeLog-5.19.2", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:19:29Z/" } ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=824d4f64c20093275f72fc8101394d75ff6a249e", "reference_id": "?id=824d4f64c20093275f72fc8101394d75ff6a249e", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:19:29Z/" } ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=824d4f64c20093275f72fc8101394d75ff6a249e" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1689/", "reference_id": "ZDI-22-1689", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:19:29Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1689/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-47938" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-96bc-a364-8fd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78977?format=api", "vulnerability_id": "VCID-98b2-bte2-wfd3", "summary": "kernel: A flaw in unix_sock_destructor/unix_release_sock in net/unix/af_unix.c leads to memory leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3543.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3543.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3543", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28357", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28643", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.2853", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28457", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.283", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.2893", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28979", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28786", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28895", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.289", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28857", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28807", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28828", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28804", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28754", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3543" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161185", "reference_id": "2161185", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161185" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" }, { "reference_url": "https://usn.ubuntu.com/5851-1/", "reference_id": "USN-5851-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5851-1/" }, { "reference_url": "https://usn.ubuntu.com/5860-1/", "reference_id": "USN-5860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5860-1/" }, { "reference_url": "https://usn.ubuntu.com/5876-1/", "reference_id": "USN-5876-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5876-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3543" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98b2-bte2-wfd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78990?format=api", "vulnerability_id": "VCID-9e8s-d6bj-kba4", "summary": "kernel: Race condition in roccat_report_event in drivers/hid/hid-roccat.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41850.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41850.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41850", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06658", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06647", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06687", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06661", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0649", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06669", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06497", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06922", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06807", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06855", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06841", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06896", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06926", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06914", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0691", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10627", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41850" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41850" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131378", "reference_id": "2131378", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131378" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" }, { "reference_url": "https://usn.ubuntu.com/5851-1/", "reference_id": "USN-5851-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5851-1/" }, { "reference_url": "https://usn.ubuntu.com/5853-1/", "reference_id": "USN-5853-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5853-1/" }, { "reference_url": "https://usn.ubuntu.com/5854-1/", "reference_id": "USN-5854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5854-1/" }, { "reference_url": "https://usn.ubuntu.com/5860-1/", "reference_id": "USN-5860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5860-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5862-1/", "reference_id": "USN-5862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5862-1/" }, { "reference_url": "https://usn.ubuntu.com/5865-1/", "reference_id": "USN-5865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5865-1/" }, { "reference_url": "https://usn.ubuntu.com/5874-1/", "reference_id": "USN-5874-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5874-1/" }, { "reference_url": "https://usn.ubuntu.com/5875-1/", "reference_id": "USN-5875-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5875-1/" }, { "reference_url": "https://usn.ubuntu.com/5876-1/", "reference_id": "USN-5876-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5876-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5909-1/", "reference_id": "USN-5909-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5909-1/" }, { "reference_url": "https://usn.ubuntu.com/5918-1/", "reference_id": "USN-5918-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5918-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/5976-1/", "reference_id": "USN-5976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5976-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-41850" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9e8s-d6bj-kba4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78976?format=api", "vulnerability_id": "VCID-9mam-pneh-5yhy", "summary": "kernel: nfsd buffer overflow by RPC message over TCP with garbage data", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43945.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43945.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43945", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53574", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53527", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55923", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55859", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55883", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55864", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55938", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55963", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.5596", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55921", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.5595", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55952", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55961", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55942", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48772", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48772" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33621", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33847" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35247", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35247" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36014", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36014" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36015", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36015" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36894", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36894" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38579", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38579" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38582", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38582" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38605", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38605" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38607", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38607" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38613", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38621", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38659", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38659" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38780", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38780" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39292", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39292" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39301", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39301" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39467" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39471", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39471" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39476" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39495", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39495" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39503", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39503" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40963", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40963" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40980", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40980" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40983", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40983" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40993" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752", "reference_id": "2141752", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141752" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8", "reference_id": "?id=f90497a16e434c2211c66e3de8e77b17868382b8", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-01T19:08:01Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8" }, { "reference_url": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html", "reference_id": "Kernel-Live-Patch-Security-Notice-LNS-0092-1.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-01T19:08:01Z/" } ], "url": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221215-0006/", "reference_id": "ntap-20221215-0006", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-01T19:08:01Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221215-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:9082", "reference_id": "RHSA-2022:9082", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:9082" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0300", "reference_id": "RHSA-2023:0300", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0300" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0334", "reference_id": "RHSA-2023:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0348", "reference_id": "RHSA-2023:0348", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0348" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0832", "reference_id": "RHSA-2023:0832", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0832" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0839", "reference_id": "RHSA-2023:0839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0854", "reference_id": "RHSA-2023:0854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0854" }, { "reference_url": "https://usn.ubuntu.com/5754-1/", "reference_id": "USN-5754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-1/" }, { "reference_url": "https://usn.ubuntu.com/5754-2/", "reference_id": "USN-5754-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-2/" }, { "reference_url": "https://usn.ubuntu.com/5755-1/", "reference_id": "USN-5755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-1/" }, { "reference_url": "https://usn.ubuntu.com/5755-2/", "reference_id": "USN-5755-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-2/" }, { "reference_url": "https://usn.ubuntu.com/5773-1/", "reference_id": "USN-5773-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5773-1/" }, { "reference_url": "https://usn.ubuntu.com/5779-1/", "reference_id": "USN-5779-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5779-1/" }, { "reference_url": "https://usn.ubuntu.com/5789-1/", "reference_id": "USN-5789-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5789-1/" }, { "reference_url": "https://usn.ubuntu.com/5794-1/", "reference_id": "USN-5794-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5794-1/" }, { "reference_url": "https://usn.ubuntu.com/5802-1/", "reference_id": "USN-5802-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5802-1/" }, { "reference_url": "https://usn.ubuntu.com/5804-1/", "reference_id": "USN-5804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5804-1/" }, { "reference_url": "https://usn.ubuntu.com/5804-2/", "reference_id": "USN-5804-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5804-2/" }, { "reference_url": "https://usn.ubuntu.com/5808-1/", "reference_id": "USN-5808-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5808-1/" }, { "reference_url": "https://usn.ubuntu.com/5813-1/", "reference_id": "USN-5813-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5813-1/" }, { "reference_url": "https://usn.ubuntu.com/5829-1/", "reference_id": "USN-5829-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5829-1/" }, { "reference_url": "https://usn.ubuntu.com/5830-1/", "reference_id": "USN-5830-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5830-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5863-1/", "reference_id": "USN-5863-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5863-1/" }, { "reference_url": "https://usn.ubuntu.com/5875-1/", "reference_id": "USN-5875-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5875-1/" }, { "reference_url": "https://usn.ubuntu.com/5914-1/", "reference_id": "USN-5914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5914-1/" }, { "reference_url": "https://usn.ubuntu.com/5918-1/", "reference_id": "USN-5918-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5918-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-43945" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9mam-pneh-5yhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78958?format=api", "vulnerability_id": "VCID-9nyv-n5f5-ekbf", "summary": "kernel: memory leak in ipv6_renew_options()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3524.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3524.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3524", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19049", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18929", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18819", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18799", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18754", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18634", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1914", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19192", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18909", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18988", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19042", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19003", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18951", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18905", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18918", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26165", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150947", "reference_id": "2150947", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150947" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724", "reference_id": "RHSA-2024:0724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0724" }, { "reference_url": "https://usn.ubuntu.com/5754-1/", "reference_id": "USN-5754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-1/" }, { "reference_url": "https://usn.ubuntu.com/5754-2/", "reference_id": "USN-5754-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-2/" }, { "reference_url": "https://usn.ubuntu.com/5755-1/", "reference_id": "USN-5755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-1/" }, { "reference_url": "https://usn.ubuntu.com/5755-2/", "reference_id": "USN-5755-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-1/", "reference_id": "USN-5756-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-1/" }, { "reference_url": "https://usn.ubuntu.com/5756-2/", "reference_id": "USN-5756-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-3/", "reference_id": "USN-5756-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-3/" }, { "reference_url": "https://usn.ubuntu.com/5757-1/", "reference_id": "USN-5757-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-1/" }, { "reference_url": "https://usn.ubuntu.com/5757-2/", "reference_id": "USN-5757-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-2/" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5773-1/", "reference_id": "USN-5773-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5773-1/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" }, { "reference_url": "https://usn.ubuntu.com/5779-1/", "reference_id": "USN-5779-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5779-1/" }, { "reference_url": "https://usn.ubuntu.com/5780-1/", "reference_id": "USN-5780-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5780-1/" }, { "reference_url": "https://usn.ubuntu.com/5789-1/", "reference_id": "USN-5789-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5789-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3524" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9nyv-n5f5-ekbf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4345?format=api", "vulnerability_id": "VCID-agq2-bq7w-33d1", "summary": "Guests can trigger deadlock in Linux netback driver", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42329.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42329.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42329", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03769", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03781", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07949", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.0783", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07888", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07842", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07814", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08353", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08489", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08495", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08337", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08453", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.085", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08494", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08474", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08461", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42329" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42329" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/12/08/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:23:34Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/12/08/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/12/09/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:23:34Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/12/09/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156215", "reference_id": "2156215", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156215" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/12/08/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:23:34Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/12/08/3" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-424.txt", "reference_id": "advisory-424.txt", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:23:34Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-424.txt" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html", "reference_id": "msg00031.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:23:34Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html", "reference_id": "msg00034.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:23:34Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html" }, { "reference_url": "https://usn.ubuntu.com/5912-1/", "reference_id": "USN-5912-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5912-1/" }, { "reference_url": "https://usn.ubuntu.com/5917-1/", "reference_id": "USN-5917-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5917-1/" }, { "reference_url": "https://usn.ubuntu.com/5919-1/", "reference_id": "USN-5919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5919-1/" }, { "reference_url": "https://usn.ubuntu.com/5920-1/", "reference_id": "USN-5920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5920-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5925-1/", "reference_id": "USN-5925-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5925-1/" }, { "reference_url": "https://usn.ubuntu.com/5927-1/", "reference_id": "USN-5927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5927-1/" }, { "reference_url": "https://usn.ubuntu.com/5934-1/", "reference_id": "USN-5934-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5934-1/" }, { "reference_url": "https://usn.ubuntu.com/5935-1/", "reference_id": "USN-5935-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5935-1/" }, { "reference_url": "https://usn.ubuntu.com/5938-1/", "reference_id": "USN-5938-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5938-1/" }, { "reference_url": "https://usn.ubuntu.com/5939-1/", "reference_id": "USN-5939-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5939-1/" }, { "reference_url": "https://usn.ubuntu.com/5940-1/", "reference_id": "USN-5940-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5940-1/" }, { "reference_url": "https://usn.ubuntu.com/5941-1/", "reference_id": "USN-5941-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5941-1/" }, { "reference_url": "https://usn.ubuntu.com/5951-1/", "reference_id": "USN-5951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5951-1/" }, { "reference_url": "https://usn.ubuntu.com/5962-1/", "reference_id": "USN-5962-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5962-1/" }, { "reference_url": "https://usn.ubuntu.com/5970-1/", "reference_id": "USN-5970-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5970-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/5979-1/", "reference_id": "USN-5979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5979-1/" }, { "reference_url": "https://usn.ubuntu.com/6000-1/", "reference_id": "USN-6000-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6000-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-424.html", "reference_id": "XSA-424", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-424.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-42329" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-agq2-bq7w-33d1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79133?format=api", "vulnerability_id": "VCID-ap5s-w9uk-zff3", "summary": "kernel: nfp: use-after-free in area_cache_get()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3545.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3545.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3545", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04174", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0411", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04232", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04244", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04263", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04298", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04283", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04114", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04149", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04181", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04195", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04157", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04131", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04102", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05397", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161310", "reference_id": "2161310", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161310" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0439", "reference_id": "RHSA-2024:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0448", "reference_id": "RHSA-2024:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0461", "reference_id": "RHSA-2024:0461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724", "reference_id": "RHSA-2024:0724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0881", "reference_id": "RHSA-2024:0881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0881" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0897", "reference_id": "RHSA-2024:0897", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0897" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1250", "reference_id": "RHSA-2024:1250", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1250" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1268", "reference_id": "RHSA-2024:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1269", "reference_id": "RHSA-2024:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1306", "reference_id": "RHSA-2024:1306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1367", "reference_id": "RHSA-2024:1367", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1367" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1382", "reference_id": "RHSA-2024:1382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404", "reference_id": "RHSA-2024:1404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1404" }, { "reference_url": "https://usn.ubuntu.com/5858-1/", "reference_id": "USN-5858-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5858-1/" }, { "reference_url": "https://usn.ubuntu.com/5859-1/", "reference_id": "USN-5859-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5859-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5911-1/", "reference_id": "USN-5911-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5911-1/" }, { "reference_url": "https://usn.ubuntu.com/5912-1/", "reference_id": "USN-5912-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5912-1/" }, { "reference_url": "https://usn.ubuntu.com/5917-1/", "reference_id": "USN-5917-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5917-1/" }, { "reference_url": "https://usn.ubuntu.com/5919-1/", "reference_id": "USN-5919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5919-1/" }, { "reference_url": "https://usn.ubuntu.com/5920-1/", "reference_id": "USN-5920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5920-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5925-1/", "reference_id": "USN-5925-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5925-1/" }, { "reference_url": "https://usn.ubuntu.com/5927-1/", "reference_id": "USN-5927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5927-1/" }, { "reference_url": "https://usn.ubuntu.com/5929-1/", "reference_id": "USN-5929-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5929-1/" }, { "reference_url": "https://usn.ubuntu.com/5934-1/", "reference_id": "USN-5934-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5934-1/" }, { "reference_url": "https://usn.ubuntu.com/5935-1/", "reference_id": "USN-5935-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5935-1/" }, { "reference_url": "https://usn.ubuntu.com/5938-1/", "reference_id": "USN-5938-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5938-1/" }, { "reference_url": "https://usn.ubuntu.com/5939-1/", "reference_id": "USN-5939-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5939-1/" }, { "reference_url": "https://usn.ubuntu.com/5940-1/", "reference_id": "USN-5940-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5940-1/" }, { "reference_url": "https://usn.ubuntu.com/5941-1/", "reference_id": "USN-5941-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5941-1/" }, { "reference_url": "https://usn.ubuntu.com/5950-1/", "reference_id": "USN-5950-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5950-1/" }, { "reference_url": "https://usn.ubuntu.com/5951-1/", "reference_id": "USN-5951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5951-1/" }, { "reference_url": "https://usn.ubuntu.com/5962-1/", "reference_id": "USN-5962-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5962-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/6000-1/", "reference_id": "USN-6000-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6000-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3545" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ap5s-w9uk-zff3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79629?format=api", "vulnerability_id": "VCID-b87y-f2rd-2fg7", "summary": "kernel: NFS over RDMA random memory leakage", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0812.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0812.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0812", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.324", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38669", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.387", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38544", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38519", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38431", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38312", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38797", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38818", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38746", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38796", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38807", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38819", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38783", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38755", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38801", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38779", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058955", "reference_id": "2058955", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058955" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-0812" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b87y-f2rd-2fg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79131?format=api", "vulnerability_id": "VCID-bp6k-v3c5-gudy", "summary": "kernel: LoadPin bypass via dm-verity table reload", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2503.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2503.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2503", "reference_id": "", "reference_type": "", "scores": [ { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00201", "published_at": "2026-05-05T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.002", "published_at": "2026-04-29T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00202", "published_at": "2026-04-26T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00195", "published_at": "2026-04-13T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00194", "published_at": "2026-04-07T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00197", "published_at": "2026-04-18T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00193", "published_at": "2026-04-09T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00206", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2503" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177862", "reference_id": "2177862", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177862" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m", "reference_id": "GHSA-6vq3-w69p-w63m", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-21T13:39:52Z/" } ], "url": "https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230214-0005/", "reference_id": "ntap-20230214-0005", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-21T13:39:52Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230214-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7444", "reference_id": "RHSA-2022:7444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7683", "reference_id": "RHSA-2022:7683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://usn.ubuntu.com/5594-1/", "reference_id": "USN-5594-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5594-1/" }, { "reference_url": "https://usn.ubuntu.com/5599-1/", "reference_id": "USN-5599-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5599-1/" }, { "reference_url": "https://usn.ubuntu.com/5602-1/", "reference_id": "USN-5602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5602-1/" }, { "reference_url": "https://usn.ubuntu.com/5616-1/", "reference_id": "USN-5616-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5616-1/" }, { "reference_url": "https://usn.ubuntu.com/5622-1/", "reference_id": "USN-5622-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5622-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5630-1/", "reference_id": "USN-5630-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5630-1/" }, { "reference_url": "https://usn.ubuntu.com/5639-1/", "reference_id": "USN-5639-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5639-1/" }, { "reference_url": "https://usn.ubuntu.com/5647-1/", "reference_id": "USN-5647-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5647-1/" }, { "reference_url": "https://usn.ubuntu.com/5654-1/", "reference_id": "USN-5654-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5654-1/" }, { "reference_url": "https://usn.ubuntu.com/5660-1/", "reference_id": "USN-5660-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5660-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-2503" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bp6k-v3c5-gudy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79160?format=api", "vulnerability_id": "VCID-bt6z-fyxn-ckgt", "summary": "kernel: use after in tst_timer in drivers/atm/idt77252.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3635.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3635.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3635", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0177", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01759", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01768", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01762", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01752", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0175", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0174", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01825", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01816", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01811", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01857", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01817", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01742", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01756", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3635" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148458", "reference_id": "2148458", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148458" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://vuldb.com/?id.211934", "reference_id": "?id.211934", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:17Z/" } ], "url": "https://vuldb.com/?id.211934" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=3f4093e2bf4673f218c0bf17d8362337c400e77b", "reference_id": "?id=3f4093e2bf4673f218c0bf17d8362337c400e77b", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:17Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=3f4093e2bf4673f218c0bf17d8362337c400e77b" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html", "reference_id": "msg00001.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html" }, { "reference_url": "https://usn.ubuntu.com/5727-1/", "reference_id": "USN-5727-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-1/" }, { "reference_url": "https://usn.ubuntu.com/5727-2/", "reference_id": "USN-5727-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-2/" }, { "reference_url": "https://usn.ubuntu.com/5728-1/", "reference_id": "USN-5728-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-1/" }, { "reference_url": "https://usn.ubuntu.com/5728-2/", "reference_id": "USN-5728-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-2/" }, { "reference_url": "https://usn.ubuntu.com/5728-3/", "reference_id": "USN-5728-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-3/" }, { "reference_url": "https://usn.ubuntu.com/5729-1/", "reference_id": "USN-5729-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5729-1/" }, { "reference_url": "https://usn.ubuntu.com/5729-2/", "reference_id": "USN-5729-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5729-2/" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" }, { "reference_url": "https://usn.ubuntu.com/6247-1/", "reference_id": "USN-6247-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6247-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3635" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bt6z-fyxn-ckgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78786?format=api", "vulnerability_id": "VCID-byfh-pwcu-cfbs", "summary": "kernel: improper validation user-supplied data could lead in heap buffer overflow which can result in RCE", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47942.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47942.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47942", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36857", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36917", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.3695", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36782", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36849", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36822", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36797", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00996", "scoring_system": "epss", "scoring_elements": "0.7703", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00996", "scoring_system": "epss", "scoring_elements": "0.77021", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00996", "scoring_system": "epss", "scoring_elements": "0.77051", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00996", "scoring_system": "epss", "scoring_elements": "0.77017", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01014", "scoring_system": "epss", "scoring_elements": "0.77212", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01014", "scoring_system": "epss", "scoring_elements": "0.77187", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01014", "scoring_system": "epss", "scoring_elements": "0.77177", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01014", "scoring_system": "epss", "scoring_elements": "0.77186", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47942" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155946", "reference_id": "2155946", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155946" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-47942" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byfh-pwcu-cfbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78970?format=api", "vulnerability_id": "VCID-ckqp-r5m2-j3fx", "summary": "kernel: data races around sk->sk_prot", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3567.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3567.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3567", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06443", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06395", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06487", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06481", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06475", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06463", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.064", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0641", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06833", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06819", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06795", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06659", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06986", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06615", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06792", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.068", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143943", "reference_id": "2143943", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143943" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://vuldb.com/?id.211090", "reference_id": "?id.211090", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:29Z/" } ], "url": "https://vuldb.com/?id.211090" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6", "reference_id": "?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:29Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://usn.ubuntu.com/5754-1/", "reference_id": "USN-5754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-1/" }, { "reference_url": "https://usn.ubuntu.com/5754-2/", "reference_id": "USN-5754-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-2/" }, { "reference_url": "https://usn.ubuntu.com/5755-1/", "reference_id": "USN-5755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-1/" }, { "reference_url": "https://usn.ubuntu.com/5755-2/", "reference_id": "USN-5755-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-1/", "reference_id": "USN-5756-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-1/" }, { "reference_url": "https://usn.ubuntu.com/5756-2/", "reference_id": "USN-5756-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-3/", "reference_id": "USN-5756-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-3/" }, { "reference_url": "https://usn.ubuntu.com/5757-1/", "reference_id": "USN-5757-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-1/" }, { "reference_url": "https://usn.ubuntu.com/5757-2/", "reference_id": "USN-5757-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-2/" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5773-1/", "reference_id": "USN-5773-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5773-1/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" }, { "reference_url": "https://usn.ubuntu.com/5779-1/", "reference_id": "USN-5779-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5779-1/" }, { "reference_url": "https://usn.ubuntu.com/5789-1/", "reference_id": "USN-5789-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5789-1/" }, { "reference_url": "https://usn.ubuntu.com/5914-1/", "reference_id": "USN-5914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3567" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ckqp-r5m2-j3fx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78991?format=api", "vulnerability_id": "VCID-cs99-jacq-qkey", "summary": "kernel: use-after-free in l1oip timer handlers", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3565.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3565.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3565", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06992", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06801", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06808", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06826", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.068", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06838", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06626", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0667", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0665", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06699", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06734", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06732", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06725", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06717", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06654", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06645", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3565" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150953", "reference_id": "2150953", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150953" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2950", "reference_id": "RHSA-2024:2950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138", "reference_id": "RHSA-2024:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3138" }, { "reference_url": "https://usn.ubuntu.com/5754-1/", "reference_id": "USN-5754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-1/" }, { "reference_url": "https://usn.ubuntu.com/5754-2/", "reference_id": "USN-5754-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-2/" }, { "reference_url": "https://usn.ubuntu.com/5755-1/", "reference_id": "USN-5755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-1/" }, { "reference_url": "https://usn.ubuntu.com/5755-2/", "reference_id": "USN-5755-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-1/", "reference_id": "USN-5756-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-1/" }, { "reference_url": "https://usn.ubuntu.com/5756-2/", "reference_id": "USN-5756-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-3/", "reference_id": "USN-5756-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-3/" }, { "reference_url": "https://usn.ubuntu.com/5757-1/", "reference_id": "USN-5757-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-1/" }, { "reference_url": "https://usn.ubuntu.com/5757-2/", "reference_id": "USN-5757-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-2/" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" }, { "reference_url": "https://usn.ubuntu.com/5779-1/", "reference_id": "USN-5779-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5779-1/" }, { "reference_url": "https://usn.ubuntu.com/5913-1/", "reference_id": "USN-5913-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5913-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3565" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cs99-jacq-qkey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78917?format=api", "vulnerability_id": "VCID-d14e-jv1a-w7d3", "summary": "kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3619.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3619.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3619", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07672", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07597", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07521", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0751", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07649", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07596", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07573", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0754", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07528", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0753", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0757", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07547", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07606", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07625", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07624", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07611", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3619" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154235", "reference_id": "2154235", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154235" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://vuldb.com/?id.211918", "reference_id": "?id.211918", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:20Z/" } ], "url": "https://vuldb.com/?id.211918" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193", "reference_id": "?id=97097c85c088e11651146da32a4e1cdb9dfa6193", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:20Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724", "reference_id": "RHSA-2024:0724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0724" }, { "reference_url": "https://usn.ubuntu.com/5780-1/", "reference_id": "USN-5780-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5780-1/" }, { "reference_url": "https://usn.ubuntu.com/5850-1/", "reference_id": "USN-5850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5850-1/" }, { "reference_url": "https://usn.ubuntu.com/5851-1/", "reference_id": "USN-5851-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5851-1/" }, { "reference_url": "https://usn.ubuntu.com/5860-1/", "reference_id": "USN-5860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5860-1/" }, { "reference_url": "https://usn.ubuntu.com/5876-1/", "reference_id": "USN-5876-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5876-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5878-1/", "reference_id": "USN-5878-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5878-1/" }, { "reference_url": "https://usn.ubuntu.com/5879-1/", "reference_id": "USN-5879-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5879-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3619" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d14e-jv1a-w7d3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78906?format=api", "vulnerability_id": "VCID-d79b-qtu3-hud8", "summary": "kernel: use-after-free bug in mctp_sk_unhash in net/mctp/af_mctp.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3977.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3977.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3977", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28031", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28544", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28495", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.2851", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28488", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28441", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28328", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28216", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28135", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.27972", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28631", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28675", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28481", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28546", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28586", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28588", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3977" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142371", "reference_id": "2142371", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142371" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3a732b46736cd8a29092e4b0b1a9ba83e672bf89", "reference_id": "?id=3a732b46736cd8a29092e4b0b1a9ba83e672bf89", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-08T18:03:11Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3a732b46736cd8a29092e4b0b1a9ba83e672bf89" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230223-0005/", "reference_id": "ntap-20230223-0005", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-08T18:03:11Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230223-0005/" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3977" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d79b-qtu3-hud8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78962?format=api", "vulnerability_id": "VCID-dqhd-grev-t3ge", "summary": "kernel: use-after-free related to leaf anon_vma double reuse", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42703", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0088", "scoring_system": "epss", "scoring_elements": "0.75473", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76906", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76899", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76918", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76907", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76773", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76783", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76814", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76824", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76853", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76833", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76827", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.7687", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76875", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76866", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42703" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483", "reference_id": "2133483", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1091", "reference_id": "RHSA-2023:1091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1092", "reference_id": "RHSA-2023:1092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1092" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3388", "reference_id": "RHSA-2023:3388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4137", "reference_id": "RHSA-2023:4137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4138", "reference_id": "RHSA-2023:4138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4138" }, { "reference_url": "https://usn.ubuntu.com/5728-1/", "reference_id": "USN-5728-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-1/" }, { "reference_url": "https://usn.ubuntu.com/5728-2/", "reference_id": "USN-5728-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-2/" }, { "reference_url": "https://usn.ubuntu.com/5728-3/", "reference_id": "USN-5728-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-3/" }, { "reference_url": "https://usn.ubuntu.com/5755-1/", "reference_id": "USN-5755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-1/" }, { "reference_url": "https://usn.ubuntu.com/5755-2/", "reference_id": "USN-5755-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-1/", "reference_id": "USN-5756-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-1/" }, { "reference_url": "https://usn.ubuntu.com/5756-2/", "reference_id": "USN-5756-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-3/", "reference_id": "USN-5756-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-3/" }, { "reference_url": "https://usn.ubuntu.com/5757-1/", "reference_id": "USN-5757-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-1/" }, { "reference_url": "https://usn.ubuntu.com/5757-2/", "reference_id": "USN-5757-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-2/" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5773-1/", "reference_id": "USN-5773-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5773-1/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" }, { "reference_url": "https://usn.ubuntu.com/5779-1/", "reference_id": "USN-5779-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5779-1/" }, { "reference_url": "https://usn.ubuntu.com/5789-1/", "reference_id": "USN-5789-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5789-1/" }, { "reference_url": "https://usn.ubuntu.com/5916-1/", "reference_id": "USN-5916-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5916-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-42703" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dqhd-grev-t3ge" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78968?format=api", "vulnerability_id": "VCID-dqth-c54y-e7fb", "summary": "kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3566.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3566.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3566", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06912", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06857", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06943", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06942", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06934", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0693", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06869", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06853", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07143", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07169", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07127", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07111", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07298", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07055", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07191", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07161", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3566" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143893", "reference_id": "2143893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143893" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://vuldb.com/?id.211089", "reference_id": "?id.211089", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:33Z/" } ], "url": "https://vuldb.com/?id.211089" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57", "reference_id": "?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:33Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724", "reference_id": "RHSA-2024:0724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0724" }, { "reference_url": "https://usn.ubuntu.com/5754-1/", "reference_id": "USN-5754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-1/" }, { "reference_url": "https://usn.ubuntu.com/5754-2/", "reference_id": "USN-5754-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-2/" }, { "reference_url": "https://usn.ubuntu.com/5755-1/", "reference_id": "USN-5755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-1/" }, { "reference_url": "https://usn.ubuntu.com/5755-2/", "reference_id": "USN-5755-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-1/", "reference_id": "USN-5756-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-1/" }, { "reference_url": "https://usn.ubuntu.com/5756-2/", "reference_id": "USN-5756-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-3/", "reference_id": "USN-5756-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-3/" }, { "reference_url": "https://usn.ubuntu.com/5757-1/", "reference_id": "USN-5757-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-1/" }, { "reference_url": "https://usn.ubuntu.com/5757-2/", "reference_id": "USN-5757-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-2/" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5773-1/", "reference_id": "USN-5773-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5773-1/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" }, { "reference_url": "https://usn.ubuntu.com/5779-1/", "reference_id": "USN-5779-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5779-1/" }, { "reference_url": "https://usn.ubuntu.com/5789-1/", "reference_id": "USN-5789-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5789-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3566" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dqth-c54y-e7fb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79188?format=api", "vulnerability_id": "VCID-ejj4-yt8j-c7fm", "summary": "kernel: race condition in xfrm_probe_algs can lead to OOB read/write", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3028.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3028.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3028", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01259", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01265", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.0127", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01263", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.017", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02077", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02084", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02078", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.0208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02098", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02075", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.0206", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02056", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02032", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02045", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122228", "reference_id": "2122228", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122228" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://usn.ubuntu.com/5650-1/", "reference_id": "USN-5650-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5650-1/" }, { "reference_url": "https://usn.ubuntu.com/5693-1/", "reference_id": "USN-5693-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5693-1/" }, { "reference_url": "https://usn.ubuntu.com/5727-1/", "reference_id": "USN-5727-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-1/" }, { "reference_url": "https://usn.ubuntu.com/5727-2/", "reference_id": "USN-5727-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-2/" }, { "reference_url": "https://usn.ubuntu.com/5728-1/", "reference_id": "USN-5728-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-1/" }, { "reference_url": "https://usn.ubuntu.com/5728-2/", "reference_id": "USN-5728-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-2/" }, { "reference_url": "https://usn.ubuntu.com/5728-3/", "reference_id": "USN-5728-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-3/" }, { "reference_url": "https://usn.ubuntu.com/5729-1/", "reference_id": "USN-5729-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5729-1/" }, { "reference_url": "https://usn.ubuntu.com/5729-2/", "reference_id": "USN-5729-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5729-2/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3028" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ejj4-yt8j-c7fm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79173?format=api", "vulnerability_id": "VCID-ensk-7dvm-p7g7", "summary": "kernel: an out-of-bounds vulnerability in i2c-ismt driver", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2873.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2873.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2873", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12107", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12224", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12202", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12167", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12054", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.11969", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1231", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12358", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12156", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12235", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12285", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12293", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12256", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12219", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12109", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12113", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048", "reference_id": "2119048", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119048" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0832", "reference_id": "RHSA-2023:0832", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0832" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0854", "reference_id": "RHSA-2023:0854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0951", "reference_id": "RHSA-2023:0951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0979", "reference_id": "RHSA-2023:0979", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0979" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://usn.ubuntu.com/5594-1/", "reference_id": "USN-5594-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5594-1/" }, { "reference_url": "https://usn.ubuntu.com/5599-1/", "reference_id": "USN-5599-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5599-1/" }, { "reference_url": "https://usn.ubuntu.com/5602-1/", "reference_id": "USN-5602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5602-1/" }, { "reference_url": "https://usn.ubuntu.com/5616-1/", "reference_id": "USN-5616-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5616-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-2873" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ensk-7dvm-p7g7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79319?format=api", "vulnerability_id": "VCID-eyzv-gxvw-9kee", "summary": "kernel: a double free in drivers/rpmsg/virtio_rpmsg_bus.c may lead to crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34495.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34495.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34495", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16492", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16652", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16554", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16542", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16508", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16374", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16809", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16866", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16651", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16736", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1679", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1677", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16726", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16669", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16606", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16614", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34495" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102218", "reference_id": "2102218", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102218" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5529-1/", "reference_id": "USN-5529-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5529-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-34495" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eyzv-gxvw-9kee" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79008?format=api", "vulnerability_id": "VCID-g2k9-eds7-6qe3", "summary": "kernel: memory corruption in usbmon driver", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43750.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43750.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43750", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19108", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19101", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19091", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19133", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19187", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21309", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21084", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21351", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21406", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21158", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21299", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21138", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2114", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21116", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21016", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151270", "reference_id": "2151270", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151270" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1987", "reference_id": "RHSA-2023:1987", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1987" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1988", "reference_id": "RHSA-2023:1988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1988" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5791-1/", "reference_id": "USN-5791-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-1/" }, { "reference_url": "https://usn.ubuntu.com/5791-2/", "reference_id": "USN-5791-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-2/" }, { "reference_url": "https://usn.ubuntu.com/5791-3/", "reference_id": "USN-5791-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-3/" }, { "reference_url": "https://usn.ubuntu.com/5792-1/", "reference_id": "USN-5792-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-1/" }, { "reference_url": "https://usn.ubuntu.com/5792-2/", "reference_id": "USN-5792-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" }, { "reference_url": "https://usn.ubuntu.com/5815-1/", "reference_id": "USN-5815-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5815-1/" }, { "reference_url": "https://usn.ubuntu.com/5854-1/", "reference_id": "USN-5854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5854-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5862-1/", "reference_id": "USN-5862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5862-1/" }, { "reference_url": "https://usn.ubuntu.com/5865-1/", "reference_id": "USN-5865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5865-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5913-1/", "reference_id": "USN-5913-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5913-1/" }, { "reference_url": "https://usn.ubuntu.com/5919-1/", "reference_id": "USN-5919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5919-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-43750" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g2k9-eds7-6qe3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79562?format=api", "vulnerability_id": "VCID-g8j3-3ky8-h7av", "summary": "kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2153.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2153.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2153", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03593", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03579", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06332", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06182", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06377", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06171", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06351", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06868", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06563", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06613", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06657", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06648", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06641", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06633", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06709", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06737", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069736", "reference_id": "2069736", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069736" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7444", "reference_id": "RHSA-2022:7444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7683", "reference_id": "RHSA-2022:7683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://usn.ubuntu.com/5727-1/", "reference_id": "USN-5727-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-1/" }, { "reference_url": "https://usn.ubuntu.com/5727-2/", "reference_id": "USN-5727-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-2/" }, { "reference_url": "https://usn.ubuntu.com/5728-1/", "reference_id": "USN-5728-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-1/" }, { "reference_url": "https://usn.ubuntu.com/5728-2/", "reference_id": "USN-5728-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-2/" }, { "reference_url": "https://usn.ubuntu.com/5728-3/", "reference_id": "USN-5728-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-3/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-2153" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g8j3-3ky8-h7av" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79024?format=api", "vulnerability_id": "VCID-hnf3-a64g-3yba", "summary": "kernel: Improper update of reference count in io_uring leads to use-after-free", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3910.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3910.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3910", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70609", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70537", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70521", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70507", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.7055", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70559", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70587", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70596", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70595", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70568", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70456", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70474", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70452", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70498", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70513", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3910" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144960", "reference_id": "2144960", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144960" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://kernel.dance/#fc7222c3a9f56271fba02aabbfbae999042f1679", "reference_id": "#fc7222c3a9f56271fba02aabbfbae999042f1679", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:05Z/" } ], "url": "https://kernel.dance/#fc7222c3a9f56271fba02aabbfbae999042f1679" }, { "reference_url": "https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679", "reference_id": "fc7222c3a9f56271fba02aabbfbae999042f1679", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:05Z/" } ], "url": "https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3910" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hnf3-a64g-3yba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78986?format=api", "vulnerability_id": "VCID-hxzu-828c-3qfx", "summary": "kernel: use after free bug in spl2sw_nvmem_get_mac_address", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3541.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3541.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3541", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25836", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25938", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25934", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25886", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25779", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26216", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26256", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26028", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26094", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26146", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26155", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2611", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26051", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26054", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26033", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25999", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3541" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168174", "reference_id": "2168174", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168174" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3541" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hxzu-828c-3qfx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78892?format=api", "vulnerability_id": "VCID-j8ze-t6w6-ekak", "summary": "kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42895", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21243", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21444", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21296", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21294", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21274", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21176", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22918", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22962", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22755", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22829", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22882", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22902", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22865", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22809", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22822", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22816", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147356", "reference_id": "2147356", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147356" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e", "reference_id": "#b1a2cd50c0357f243b7435a732b4e62ba3157a2e", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/" } ], "url": "https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e" }, { "reference_url": "https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e", "reference_id": "b1a2cd50c0357f243b7435a732b4e62ba3157a2e", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/" } ], "url": "https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901", "reference_id": "RHSA-2023:6901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1877", "reference_id": "RHSA-2024:1877", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1877" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2621", "reference_id": "RHSA-2024:2621", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2621" }, { "reference_url": "https://usn.ubuntu.com/5780-1/", "reference_id": "USN-5780-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5780-1/" }, { "reference_url": "https://usn.ubuntu.com/5850-1/", "reference_id": "USN-5850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5850-1/" }, { "reference_url": "https://usn.ubuntu.com/5851-1/", "reference_id": "USN-5851-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5851-1/" }, { "reference_url": "https://usn.ubuntu.com/5853-1/", "reference_id": "USN-5853-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5853-1/" }, { "reference_url": "https://usn.ubuntu.com/5858-1/", "reference_id": "USN-5858-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5858-1/" }, { "reference_url": "https://usn.ubuntu.com/5859-1/", "reference_id": "USN-5859-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5859-1/" }, { "reference_url": "https://usn.ubuntu.com/5860-1/", "reference_id": "USN-5860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5860-1/" }, { "reference_url": "https://usn.ubuntu.com/5874-1/", "reference_id": "USN-5874-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5874-1/" }, { "reference_url": "https://usn.ubuntu.com/5875-1/", "reference_id": "USN-5875-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5875-1/" }, { "reference_url": "https://usn.ubuntu.com/5876-1/", "reference_id": "USN-5876-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5876-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5878-1/", "reference_id": "USN-5878-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5878-1/" }, { "reference_url": "https://usn.ubuntu.com/5879-1/", "reference_id": "USN-5879-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5879-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5884-1/", "reference_id": "USN-5884-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5884-1/" }, { "reference_url": "https://usn.ubuntu.com/5909-1/", "reference_id": "USN-5909-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5909-1/" }, { "reference_url": "https://usn.ubuntu.com/5918-1/", "reference_id": "USN-5918-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5918-1/" }, { "reference_url": "https://usn.ubuntu.com/5919-1/", "reference_id": "USN-5919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5919-1/" }, { "reference_url": "https://usn.ubuntu.com/5920-1/", "reference_id": "USN-5920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5920-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5925-1/", "reference_id": "USN-5925-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5925-1/" }, { "reference_url": "https://usn.ubuntu.com/5926-1/", "reference_id": "USN-5926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5926-1/" }, { "reference_url": "https://usn.ubuntu.com/5927-1/", "reference_id": "USN-5927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5927-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-42895" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j8ze-t6w6-ekak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78907?format=api", "vulnerability_id": "VCID-jefe-c9nd-ufc1", "summary": "kernel: USB-accessible buffer overflow in brcmfmac", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3628.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3628.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3628", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2069", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20675", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20671", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20663", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2055", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20547", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20515", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20407", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20858", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20916", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2063", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20706", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20785", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20742", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21114", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150960", "reference_id": "2150960", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150960" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295", "reference_id": "fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-08T14:15:33Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://usn.ubuntu.com/5780-1/", "reference_id": "USN-5780-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5780-1/" }, { "reference_url": "https://usn.ubuntu.com/5850-1/", "reference_id": "USN-5850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5850-1/" }, { "reference_url": "https://usn.ubuntu.com/5851-1/", "reference_id": "USN-5851-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5851-1/" }, { "reference_url": "https://usn.ubuntu.com/5853-1/", "reference_id": "USN-5853-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5853-1/" }, { "reference_url": "https://usn.ubuntu.com/5860-1/", "reference_id": "USN-5860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5860-1/" }, { "reference_url": "https://usn.ubuntu.com/5874-1/", "reference_id": "USN-5874-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5874-1/" }, { "reference_url": "https://usn.ubuntu.com/5875-1/", "reference_id": "USN-5875-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5875-1/" }, { "reference_url": "https://usn.ubuntu.com/5876-1/", "reference_id": "USN-5876-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5876-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5878-1/", "reference_id": "USN-5878-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5878-1/" }, { "reference_url": "https://usn.ubuntu.com/5879-1/", "reference_id": "USN-5879-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5879-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5909-1/", "reference_id": "USN-5909-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5909-1/" }, { "reference_url": "https://usn.ubuntu.com/5918-1/", "reference_id": "USN-5918-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5918-1/" }, { "reference_url": "https://usn.ubuntu.com/5919-1/", "reference_id": "USN-5919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5919-1/" }, { "reference_url": "https://usn.ubuntu.com/5920-1/", "reference_id": "USN-5920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5920-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5925-1/", "reference_id": "USN-5925-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5925-1/" }, { "reference_url": "https://usn.ubuntu.com/5927-1/", "reference_id": "USN-5927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5927-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/5976-1/", "reference_id": "USN-5976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5976-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3628" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jefe-c9nd-ufc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78988?format=api", "vulnerability_id": "VCID-jw25-6cs7-dkev", "summary": "Kernel: A flaw in damon_sysfs_add_target in mm/damon/sysfs.c in Netfilter leads to memory leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3544.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3544.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3544", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05378", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05293", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05336", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05341", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05335", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05115", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05144", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05009", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05025", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05006", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04987", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04968", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04914", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04925", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05257", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3544" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161210", "reference_id": "2161210", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161210" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3544" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jw25-6cs7-dkev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79092?format=api", "vulnerability_id": "VCID-kf7y-k2px-uug5", "summary": "kernel: net scheduler use-after-free information disclosure vulnerability", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3586.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3586.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3586", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.16948", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17138", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17043", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17026", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.16969", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.16834", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18799", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18852", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18572", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18651", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18712", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18613", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18557", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18566", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3586" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124475", "reference_id": "2124475", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124475" }, { "reference_url": "https://github.com/torvalds/linux/commit/9efd23297cca", "reference_id": "9efd23297cca", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-09T14:48:08Z/" } ], "url": "https://github.com/torvalds/linux/commit/9efd23297cca" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html", "reference_id": "msg00001.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-09T14:48:08Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/upcoming/", "reference_id": "upcoming", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-09T14:48:08Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/upcoming/" }, { "reference_url": "https://usn.ubuntu.com/5790-1/", "reference_id": "USN-5790-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5790-1/" }, { "reference_url": "https://usn.ubuntu.com/5791-1/", "reference_id": "USN-5791-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-1/" }, { "reference_url": "https://usn.ubuntu.com/5791-2/", "reference_id": "USN-5791-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-2/" }, { "reference_url": "https://usn.ubuntu.com/5791-3/", "reference_id": "USN-5791-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-3/" }, { "reference_url": "https://usn.ubuntu.com/5792-1/", "reference_id": "USN-5792-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-1/" }, { "reference_url": "https://usn.ubuntu.com/5792-2/", "reference_id": "USN-5792-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" }, { "reference_url": "https://usn.ubuntu.com/5815-1/", "reference_id": "USN-5815-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5815-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/6045-1/", "reference_id": "USN-6045-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6045-1/" }, { "reference_url": "https://usn.ubuntu.com/6071-1/", "reference_id": "USN-6071-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6071-1/" }, { "reference_url": "https://usn.ubuntu.com/6124-1/", "reference_id": "USN-6124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6124-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3586" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kf7y-k2px-uug5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79087?format=api", "vulnerability_id": "VCID-n2c4-w748-tyau", "summary": "kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3623.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3623.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3623", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22844", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23023", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23096", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23149", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23168", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.2313", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23073", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23088", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23079", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23042", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22872", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22866", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22863", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.2276", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.2319", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23234", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165721", "reference_id": "2165721", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165721" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5324", "reference_id": "dsa-5324", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5324" }, { "reference_url": "https://vuldb.com/?id.211921", "reference_id": "?id.211921", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/" } ], "url": "https://vuldb.com/?id.211921" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f", "reference_id": "?id=fac35ba763ed07ba93154c95ffc0c4a55023707f", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724", "reference_id": "RHSA-2024:0724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0724" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" }, { "reference_url": "https://usn.ubuntu.com/5851-1/", "reference_id": "USN-5851-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5851-1/" }, { "reference_url": "https://usn.ubuntu.com/5860-1/", "reference_id": "USN-5860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5860-1/" }, { "reference_url": "https://usn.ubuntu.com/5876-1/", "reference_id": "USN-5876-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5876-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5917-1/", "reference_id": "USN-5917-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5917-1/" }, { "reference_url": "https://usn.ubuntu.com/5934-1/", "reference_id": "USN-5934-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5934-1/" }, { "reference_url": "https://usn.ubuntu.com/5939-1/", "reference_id": "USN-5939-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5939-1/" }, { "reference_url": "https://usn.ubuntu.com/5940-1/", "reference_id": "USN-5940-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5940-1/" }, { "reference_url": "https://usn.ubuntu.com/5951-1/", "reference_id": "USN-5951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5951-1/" }, { "reference_url": "https://usn.ubuntu.com/6000-1/", "reference_id": "USN-6000-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6000-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3623" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n2c4-w748-tyau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78778?format=api", "vulnerability_id": "VCID-ng25-c2xk-9fem", "summary": "kernel: NULL pointer dereference in traffic control subsystem", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47929.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47929.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47929", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08731", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08685", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08699", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08652", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08654", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08589", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09472", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09521", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09434", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09508", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.0957", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09541", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09525", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09419", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.0942", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168246", "reference_id": "2168246", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168246" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6", "reference_id": "ChangeLog-6.1.6", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/" } ], "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6" }, { "reference_url": "https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html", "reference_id": "components.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/" } ], "url": "https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5324", "reference_id": "dsa-5324", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5324" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407", "reference_id": "?id=96398560f26aa07e8f2969d73c8197e6a6d10407", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html" }, { "reference_url": "https://www.spinics.net/lists/netdev/msg555705.html", "reference_id": "msg555705.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/" } ], "url": "https://www.spinics.net/lists/netdev/msg555705.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://usn.ubuntu.com/5915-1/", "reference_id": "USN-5915-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5915-1/" }, { "reference_url": "https://usn.ubuntu.com/5917-1/", "reference_id": "USN-5917-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5917-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5927-1/", "reference_id": "USN-5927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5927-1/" }, { "reference_url": "https://usn.ubuntu.com/5934-1/", "reference_id": "USN-5934-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5934-1/" }, { "reference_url": "https://usn.ubuntu.com/5939-1/", "reference_id": "USN-5939-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5939-1/" }, { "reference_url": "https://usn.ubuntu.com/5940-1/", "reference_id": "USN-5940-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5940-1/" }, { "reference_url": "https://usn.ubuntu.com/5951-1/", "reference_id": "USN-5951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5951-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/5981-1/", "reference_id": "USN-5981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5981-1/" }, { "reference_url": "https://usn.ubuntu.com/5984-1/", "reference_id": "USN-5984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5984-1/" }, { "reference_url": "https://usn.ubuntu.com/5991-1/", "reference_id": "USN-5991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5991-1/" }, { "reference_url": "https://usn.ubuntu.com/6000-1/", "reference_id": "USN-6000-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6000-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6009-1/", "reference_id": "USN-6009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6009-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" }, { "reference_url": "https://usn.ubuntu.com/6024-1/", "reference_id": "USN-6024-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6024-1/" }, { "reference_url": "https://usn.ubuntu.com/6025-1/", "reference_id": "USN-6025-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6025-1/" }, { "reference_url": "https://usn.ubuntu.com/6030-1/", "reference_id": "USN-6030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6030-1/" }, { "reference_url": "https://usn.ubuntu.com/6040-1/", "reference_id": "USN-6040-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6040-1/" }, { "reference_url": "https://usn.ubuntu.com/6057-1/", "reference_id": "USN-6057-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6057-1/" }, { "reference_url": "https://usn.ubuntu.com/6134-1/", "reference_id": "USN-6134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6134-1/" }, { "reference_url": "https://usn.ubuntu.com/6247-1/", "reference_id": "USN-6247-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6247-1/" }, { "reference_url": "https://usn.ubuntu.com/6248-1/", "reference_id": "USN-6248-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6248-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-47929" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ng25-c2xk-9fem" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4343?format=api", "vulnerability_id": "VCID-np7t-cj38-m3a7", "summary": "Guests can trigger NIC interface reset/abort/crash via netback", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3643.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3643.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3643", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25307", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25234", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25206", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25149", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25137", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25092", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.2497", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.2538", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25416", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25193", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25262", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25318", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25277", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25224", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.37849", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3643" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3643", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3643" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158198", "reference_id": "2158198", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158198" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5794-1/", "reference_id": "USN-5794-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5794-1/" }, { "reference_url": "https://usn.ubuntu.com/5802-1/", "reference_id": "USN-5802-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5802-1/" }, { "reference_url": "https://usn.ubuntu.com/5803-1/", "reference_id": "USN-5803-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5803-1/" }, { "reference_url": "https://usn.ubuntu.com/5804-1/", "reference_id": "USN-5804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5804-1/" }, { "reference_url": "https://usn.ubuntu.com/5804-2/", "reference_id": "USN-5804-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5804-2/" }, { "reference_url": "https://usn.ubuntu.com/5808-1/", "reference_id": "USN-5808-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5808-1/" }, { "reference_url": "https://usn.ubuntu.com/5813-1/", "reference_id": "USN-5813-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5813-1/" }, { "reference_url": "https://usn.ubuntu.com/5814-1/", "reference_id": "USN-5814-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5814-1/" }, { "reference_url": "https://usn.ubuntu.com/5829-1/", "reference_id": "USN-5829-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5829-1/" }, { "reference_url": "https://usn.ubuntu.com/5830-1/", "reference_id": "USN-5830-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5830-1/" }, { "reference_url": "https://usn.ubuntu.com/5831-1/", "reference_id": "USN-5831-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5831-1/" }, { "reference_url": "https://usn.ubuntu.com/5832-1/", "reference_id": "USN-5832-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5832-1/" }, { "reference_url": "https://usn.ubuntu.com/5860-1/", "reference_id": "USN-5860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5860-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5863-1/", "reference_id": "USN-5863-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5863-1/" }, { "reference_url": "https://usn.ubuntu.com/5875-1/", "reference_id": "USN-5875-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5875-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5879-1/", "reference_id": "USN-5879-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5879-1/" }, { "reference_url": "https://usn.ubuntu.com/5918-1/", "reference_id": "USN-5918-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5918-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-423.html", "reference_id": "XSA-423", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-423.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3643" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-np7t-cj38-m3a7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78975?format=api", "vulnerability_id": "VCID-pphs-rtxe-wfca", "summary": "kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3564.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3564.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3564", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25017", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25178", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25131", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.2512", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25076", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.24953", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25362", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25398", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25174", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25243", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25288", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25302", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.2526", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25207", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25217", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150999", "reference_id": "2150999", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150999" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0856", "reference_id": "RHSA-2023:0856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0856" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0858", "reference_id": "RHSA-2023:0858", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0858" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0951", "reference_id": "RHSA-2023:0951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0979", "reference_id": "RHSA-2023:0979", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0979" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1008", "reference_id": "RHSA-2023:1008", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1008" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1202", "reference_id": "RHSA-2023:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1203", "reference_id": "RHSA-2023:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1220", "reference_id": "RHSA-2023:1220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1221", "reference_id": "RHSA-2023:1221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1251", "reference_id": "RHSA-2023:1251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1251" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1435", "reference_id": "RHSA-2023:1435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1559", "reference_id": "RHSA-2023:1559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1560", "reference_id": "RHSA-2023:1560", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1560" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1666", "reference_id": "RHSA-2023:1666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1666" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3277", "reference_id": "RHSA-2023:3277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3278", "reference_id": "RHSA-2023:3278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3388", "reference_id": "RHSA-2023:3388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3431", "reference_id": "RHSA-2023:3431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3491", "reference_id": "RHSA-2023:3491", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3491" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4020", "reference_id": "RHSA-2023:4020", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4020" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4021", "reference_id": "RHSA-2023:4021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4150", "reference_id": "RHSA-2023:4150", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4150" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4151", "reference_id": "RHSA-2023:4151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4215", "reference_id": "RHSA-2023:4215", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4215" }, { "reference_url": "https://usn.ubuntu.com/5754-1/", "reference_id": "USN-5754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-1/" }, { "reference_url": "https://usn.ubuntu.com/5754-2/", "reference_id": "USN-5754-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-2/" }, { "reference_url": "https://usn.ubuntu.com/5755-1/", "reference_id": "USN-5755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-1/" }, { "reference_url": "https://usn.ubuntu.com/5755-2/", "reference_id": "USN-5755-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-1/", "reference_id": "USN-5756-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-1/" }, { "reference_url": "https://usn.ubuntu.com/5756-2/", "reference_id": "USN-5756-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-3/", "reference_id": "USN-5756-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-3/" }, { "reference_url": "https://usn.ubuntu.com/5757-1/", "reference_id": "USN-5757-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-1/" }, { "reference_url": "https://usn.ubuntu.com/5757-2/", "reference_id": "USN-5757-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-2/" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5773-1/", "reference_id": "USN-5773-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5773-1/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" }, { "reference_url": "https://usn.ubuntu.com/5779-1/", "reference_id": "USN-5779-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5779-1/" }, { "reference_url": "https://usn.ubuntu.com/5789-1/", "reference_id": "USN-5789-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5789-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3564" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pphs-rtxe-wfca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79332?format=api", "vulnerability_id": "VCID-pqzm-vutm-hkhn", "summary": "Kernel: A type conflict of size_t versus int cause an integer overflow in pxa3xx_gcu_write", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39842.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39842.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-39842", "reference_id": "", "reference_type": "", "scores": [ { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.0053", "published_at": "2026-04-09T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00547", "published_at": "2026-04-02T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.0054", "published_at": "2026-04-04T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00538", "published_at": "2026-04-07T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00535", "published_at": "2026-04-08T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00532", "published_at": "2026-04-11T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00529", "published_at": "2026-04-12T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00791", "published_at": "2026-04-21T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00788", "published_at": "2026-04-29T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00794", "published_at": "2026-05-05T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00728", "published_at": "2026-04-13T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00743", "published_at": "2026-04-16T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00747", "published_at": "2026-04-18T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00792", "published_at": "2026-04-26T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00895", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-39842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124470", "reference_id": "2124470", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124470" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5791-1/", "reference_id": "USN-5791-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-1/" }, { "reference_url": "https://usn.ubuntu.com/5791-2/", "reference_id": "USN-5791-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-2/" }, { "reference_url": "https://usn.ubuntu.com/5791-3/", "reference_id": "USN-5791-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-3/" }, { "reference_url": "https://usn.ubuntu.com/5792-1/", "reference_id": "USN-5792-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-1/" }, { "reference_url": "https://usn.ubuntu.com/5792-2/", "reference_id": "USN-5792-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-2/" }, { "reference_url": "https://usn.ubuntu.com/5815-1/", "reference_id": "USN-5815-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5815-1/" }, { "reference_url": "https://usn.ubuntu.com/5854-1/", "reference_id": "USN-5854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5854-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5862-1/", "reference_id": "USN-5862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5862-1/" }, { "reference_url": "https://usn.ubuntu.com/5865-1/", "reference_id": "USN-5865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5865-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-39842" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pqzm-vutm-hkhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79473?format=api", "vulnerability_id": "VCID-qare-c6yz-d3bt", "summary": "kernel: a double free in drivers/rpmsg/virtio_rpmsg_bus.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34494.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34494.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34494", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18163", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18365", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18266", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18251", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18212", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18074", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1858", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18635", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18344", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18427", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18479", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18431", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1838", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18325", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1834", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34494" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102205", "reference_id": "2102205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102205" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5517-1/", "reference_id": "USN-5517-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5517-1/" }, { "reference_url": "https://usn.ubuntu.com/5529-1/", "reference_id": "USN-5529-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5529-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-34494" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qare-c6yz-d3bt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79034?format=api", "vulnerability_id": "VCID-qbd9-czms-8qdn", "summary": "kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36280.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36280.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36280", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15231", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15255", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15295", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15294", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15238", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15105", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15413", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15482", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15285", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15373", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15423", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15384", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15345", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15195", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15201", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36280" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133450", "reference_id": "2133450", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133450" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://usn.ubuntu.com/5915-1/", "reference_id": "USN-5915-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5915-1/" }, { "reference_url": "https://usn.ubuntu.com/5917-1/", "reference_id": "USN-5917-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5917-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5927-1/", "reference_id": "USN-5927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5927-1/" }, { "reference_url": "https://usn.ubuntu.com/5934-1/", "reference_id": "USN-5934-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5934-1/" }, { "reference_url": "https://usn.ubuntu.com/5939-1/", "reference_id": "USN-5939-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5939-1/" }, { "reference_url": "https://usn.ubuntu.com/5940-1/", "reference_id": "USN-5940-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5940-1/" }, { "reference_url": "https://usn.ubuntu.com/5951-1/", "reference_id": "USN-5951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5951-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/5976-1/", "reference_id": "USN-5976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5976-1/" }, { "reference_url": "https://usn.ubuntu.com/5981-1/", "reference_id": "USN-5981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5981-1/" }, { "reference_url": "https://usn.ubuntu.com/5982-1/", "reference_id": "USN-5982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5982-1/" }, { "reference_url": "https://usn.ubuntu.com/5984-1/", "reference_id": "USN-5984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5984-1/" }, { "reference_url": "https://usn.ubuntu.com/5987-1/", "reference_id": "USN-5987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5987-1/" }, { "reference_url": "https://usn.ubuntu.com/5991-1/", "reference_id": "USN-5991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5991-1/" }, { "reference_url": "https://usn.ubuntu.com/6000-1/", "reference_id": "USN-6000-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6000-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6004-1/", "reference_id": "USN-6004-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6004-1/" }, { "reference_url": "https://usn.ubuntu.com/6009-1/", "reference_id": "USN-6009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6009-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" }, { "reference_url": "https://usn.ubuntu.com/6030-1/", "reference_id": "USN-6030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6030-1/" }, { "reference_url": "https://usn.ubuntu.com/6032-1/", "reference_id": "USN-6032-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6032-1/" }, { "reference_url": "https://usn.ubuntu.com/6079-1/", "reference_id": "USN-6079-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6079-1/" }, { "reference_url": "https://usn.ubuntu.com/6091-1/", "reference_id": "USN-6091-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6091-1/" }, { "reference_url": "https://usn.ubuntu.com/6096-1/", "reference_id": "USN-6096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6096-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-36280" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qbd9-czms-8qdn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79061?format=api", "vulnerability_id": "VCID-qgxx-2pek-nydy", "summary": "kernel: use-after-free in efi_capsule_write in capsule-loader.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40307.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40307.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40307", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03767", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03776", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03819", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03772", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0377", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07212", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07799", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07758", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07818", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07833", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07828", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07816", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07802", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07716", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07692", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07754", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40307" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127424", "reference_id": "2127424", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127424" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5790-1/", "reference_id": "USN-5790-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5790-1/" }, { "reference_url": "https://usn.ubuntu.com/5791-1/", "reference_id": "USN-5791-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-1/" }, { "reference_url": "https://usn.ubuntu.com/5791-2/", "reference_id": "USN-5791-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-2/" }, { "reference_url": "https://usn.ubuntu.com/5791-3/", "reference_id": "USN-5791-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-3/" }, { "reference_url": "https://usn.ubuntu.com/5792-1/", "reference_id": "USN-5792-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-1/" }, { "reference_url": "https://usn.ubuntu.com/5792-2/", "reference_id": "USN-5792-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" }, { "reference_url": "https://usn.ubuntu.com/5815-1/", "reference_id": "USN-5815-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5815-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/6071-1/", "reference_id": "USN-6071-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6071-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-40307" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qgxx-2pek-nydy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78732?format=api", "vulnerability_id": "VCID-qkam-j6uv-n7fj", "summary": "kernel: NULL pointer dereference in rawv6_push_pending_frames", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0394.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0394.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0394", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06508", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06335", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06362", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06374", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06391", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06827", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06857", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06912", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06942", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06941", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06934", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0693", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06869", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06852", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162120", "reference_id": "2162120", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162120" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17", "reference_id": "?id=cb3e9864cdbe35ff6378966660edbcbac955fe17", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230302-0005/", "reference_id": "ntap-20230302-0005", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230302-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://usn.ubuntu.com/5917-1/", "reference_id": "USN-5917-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5917-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5927-1/", "reference_id": "USN-5927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5927-1/" }, { "reference_url": "https://usn.ubuntu.com/5934-1/", "reference_id": "USN-5934-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5934-1/" }, { "reference_url": "https://usn.ubuntu.com/5939-1/", "reference_id": "USN-5939-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5939-1/" }, { "reference_url": "https://usn.ubuntu.com/5940-1/", "reference_id": "USN-5940-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5940-1/" }, { "reference_url": "https://usn.ubuntu.com/5951-1/", "reference_id": "USN-5951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5951-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/5976-1/", "reference_id": "USN-5976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5976-1/" }, { "reference_url": "https://usn.ubuntu.com/5978-1/", "reference_id": "USN-5978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5978-1/" }, { "reference_url": "https://usn.ubuntu.com/5981-1/", "reference_id": "USN-5981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5981-1/" }, { "reference_url": "https://usn.ubuntu.com/5984-1/", "reference_id": "USN-5984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5984-1/" }, { "reference_url": "https://usn.ubuntu.com/5991-1/", "reference_id": "USN-5991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5991-1/" }, { "reference_url": "https://usn.ubuntu.com/6000-1/", "reference_id": "USN-6000-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6000-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6009-1/", "reference_id": "USN-6009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6009-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" }, { "reference_url": "https://usn.ubuntu.com/6025-1/", "reference_id": "USN-6025-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6025-1/" }, { "reference_url": "https://usn.ubuntu.com/6030-1/", "reference_id": "USN-6030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6030-1/" }, { "reference_url": "https://usn.ubuntu.com/6040-1/", "reference_id": "USN-6040-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6040-1/" }, { "reference_url": "https://usn.ubuntu.com/6057-1/", "reference_id": "USN-6057-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6057-1/" }, { "reference_url": "https://usn.ubuntu.com/6079-1/", "reference_id": "USN-6079-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6079-1/" }, { "reference_url": "https://usn.ubuntu.com/6091-1/", "reference_id": "USN-6091-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6091-1/" }, { "reference_url": "https://usn.ubuntu.com/6096-1/", "reference_id": "USN-6096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6096-1/" }, { "reference_url": "https://usn.ubuntu.com/6134-1/", "reference_id": "USN-6134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6134-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2023-0394" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qkam-j6uv-n7fj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78967?format=api", "vulnerability_id": "VCID-qu2u-k7ak-4qbb", "summary": "kernel: nilfs2: memory leak in nilfs_attach_log_writer in fs/nilfs2/segment.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3646.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3646.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3646", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28794", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28746", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28601", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28707", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28665", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28617", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.3131", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31437", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.3123", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31645", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31667", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31147", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31077", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31613", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3646" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3646", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3646" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155501", "reference_id": "2155501", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155501" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://vuldb.com/?id.211961", "reference_id": "?id.211961", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:07:39Z/" } ], "url": "https://vuldb.com/?id.211961" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d0d51a97063db4704a5ef6bc978dddab1636a306", "reference_id": "?id=d0d51a97063db4704a5ef6bc978dddab1636a306", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:07:39Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d0d51a97063db4704a5ef6bc978dddab1636a306" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html", "reference_id": "msg00001.html", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:07:39Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html", "reference_id": "msg00034.html", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:07:39Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html" }, { "reference_url": "https://usn.ubuntu.com/5791-1/", "reference_id": "USN-5791-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-1/" }, { "reference_url": "https://usn.ubuntu.com/5791-2/", "reference_id": "USN-5791-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-2/" }, { "reference_url": "https://usn.ubuntu.com/5791-3/", "reference_id": "USN-5791-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-3/" }, { "reference_url": "https://usn.ubuntu.com/5792-1/", "reference_id": "USN-5792-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-1/" }, { "reference_url": "https://usn.ubuntu.com/5792-2/", "reference_id": "USN-5792-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" }, { "reference_url": "https://usn.ubuntu.com/5815-1/", "reference_id": "USN-5815-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5815-1/" }, { "reference_url": "https://usn.ubuntu.com/5854-1/", "reference_id": "USN-5854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5854-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5862-1/", "reference_id": "USN-5862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5862-1/" }, { "reference_url": "https://usn.ubuntu.com/5865-1/", "reference_id": "USN-5865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5865-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5919-1/", "reference_id": "USN-5919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5919-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/5976-1/", "reference_id": "USN-5976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5976-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3646" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qu2u-k7ak-4qbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78780?format=api", "vulnerability_id": "VCID-qx5q-yc33-huhs", "summary": "Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23455.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23455.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23455", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07426", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07321", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0728", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07288", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07259", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07271", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08405", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08385", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08298", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08437", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0836", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0843", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08447", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0844", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08421", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08282", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2023/01/10/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2023/01/10/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168332", "reference_id": "2168332", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168332" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2023/01/10/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2023/01/10/4" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5324", "reference_id": "dsa-5324", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5324" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b", "reference_id": "?id=a2965c7be0522eaa18808684b7b82b248515511b", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901", "reference_id": "RHSA-2023:6901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575", "reference_id": "RHSA-2024:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724", "reference_id": "RHSA-2024:0724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0724" }, { "reference_url": "https://usn.ubuntu.com/5915-1/", "reference_id": "USN-5915-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5915-1/" }, { "reference_url": "https://usn.ubuntu.com/5917-1/", "reference_id": "USN-5917-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5917-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5927-1/", "reference_id": "USN-5927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5927-1/" }, { "reference_url": "https://usn.ubuntu.com/5934-1/", "reference_id": "USN-5934-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5934-1/" }, { "reference_url": "https://usn.ubuntu.com/5939-1/", "reference_id": "USN-5939-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5939-1/" }, { "reference_url": "https://usn.ubuntu.com/5940-1/", "reference_id": "USN-5940-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5940-1/" }, { "reference_url": "https://usn.ubuntu.com/5951-1/", "reference_id": "USN-5951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5951-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/5981-1/", "reference_id": "USN-5981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5981-1/" }, { "reference_url": "https://usn.ubuntu.com/5982-1/", "reference_id": "USN-5982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5982-1/" }, { "reference_url": "https://usn.ubuntu.com/5984-1/", "reference_id": "USN-5984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5984-1/" }, { "reference_url": "https://usn.ubuntu.com/5987-1/", "reference_id": "USN-5987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5987-1/" }, { "reference_url": "https://usn.ubuntu.com/5991-1/", "reference_id": "USN-5991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5991-1/" }, { "reference_url": "https://usn.ubuntu.com/6000-1/", "reference_id": "USN-6000-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6000-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6004-1/", "reference_id": "USN-6004-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6004-1/" }, { "reference_url": "https://usn.ubuntu.com/6009-1/", "reference_id": "USN-6009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6009-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" }, { "reference_url": "https://usn.ubuntu.com/6030-1/", "reference_id": "USN-6030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6030-1/" }, { "reference_url": "https://usn.ubuntu.com/6071-1/", "reference_id": "USN-6071-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6071-1/" }, { "reference_url": "https://usn.ubuntu.com/6072-1/", "reference_id": "USN-6072-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6072-1/" }, { "reference_url": "https://usn.ubuntu.com/6079-1/", "reference_id": "USN-6079-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6079-1/" }, { "reference_url": "https://usn.ubuntu.com/6091-1/", "reference_id": "USN-6091-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6091-1/" }, { "reference_url": "https://usn.ubuntu.com/6096-1/", "reference_id": "USN-6096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6096-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2023-23455" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qx5q-yc33-huhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78764?format=api", "vulnerability_id": "VCID-r4pv-ac7b-aufb", "summary": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0266.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0266.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0266", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26958", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26922", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26747", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26816", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26864", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31594", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.35602", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.35499", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36317", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36627", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36602", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36648", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.3663", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36571", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36347", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2163379", "reference_id": "2163379", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2163379" }, { "reference_url": "https://github.com/torvalds/linux/commit/56b88b50565cd8b946a2d00b0c83927b7ebb055e", "reference_id": "56b88b50565cd8b946a2d00b0c83927b7ebb055e", "reference_type": "", "scores": [ { "value": "7.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/" } ], "url": "https://github.com/torvalds/linux/commit/56b88b50565cd8b946a2d00b0c83927b7ebb055e" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-5.10/alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4", "reference_id": "alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4", "reference_type": "", "scores": [ { "value": "7.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-5.10/alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://github.com/torvalds/linux/commit/becf9e5d553c2389d857a3c178ce80fdb34a02e1", "reference_id": "becf9e5d553c2389d857a3c178ce80fdb34a02e1", "reference_type": "", "scores": [ { "value": "7.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/" } ], "url": "https://github.com/torvalds/linux/commit/becf9e5d553c2389d857a3c178ce80fdb34a02e1" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "7.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1202", "reference_id": "RHSA-2023:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1203", "reference_id": "RHSA-2023:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1435", "reference_id": "RHSA-2023:1435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1469", "reference_id": "RHSA-2023:1469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1470", "reference_id": "RHSA-2023:1470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1471", "reference_id": "RHSA-2023:1471", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1471" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1554", "reference_id": "RHSA-2023:1554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1554" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1556", "reference_id": "RHSA-2023:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1557", "reference_id": "RHSA-2023:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1559", "reference_id": "RHSA-2023:1559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1560", "reference_id": "RHSA-2023:1560", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1560" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1566", "reference_id": "RHSA-2023:1566", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1566" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1584", "reference_id": "RHSA-2023:1584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1588", "reference_id": "RHSA-2023:1588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1590", "reference_id": "RHSA-2023:1590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1659", "reference_id": "RHSA-2023:1659", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1659" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1660", "reference_id": "RHSA-2023:1660", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1660" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1662", "reference_id": "RHSA-2023:1662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1666", "reference_id": "RHSA-2023:1666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1666" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1677", "reference_id": "RHSA-2023:1677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1677" }, { "reference_url": "https://usn.ubuntu.com/5915-1/", "reference_id": "USN-5915-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5915-1/" }, { "reference_url": "https://usn.ubuntu.com/5917-1/", "reference_id": "USN-5917-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5917-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5927-1/", "reference_id": "USN-5927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5927-1/" }, { "reference_url": "https://usn.ubuntu.com/5934-1/", "reference_id": "USN-5934-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5934-1/" }, { "reference_url": "https://usn.ubuntu.com/5939-1/", "reference_id": "USN-5939-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5939-1/" }, { "reference_url": "https://usn.ubuntu.com/5940-1/", "reference_id": "USN-5940-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5940-1/" }, { "reference_url": "https://usn.ubuntu.com/5951-1/", "reference_id": "USN-5951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5951-1/" }, { "reference_url": "https://usn.ubuntu.com/5970-1/", "reference_id": "USN-5970-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5970-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/5979-1/", "reference_id": "USN-5979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5979-1/" }, { "reference_url": "https://usn.ubuntu.com/5981-1/", "reference_id": "USN-5981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5981-1/" }, { "reference_url": "https://usn.ubuntu.com/5982-1/", "reference_id": "USN-5982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5982-1/" }, { "reference_url": "https://usn.ubuntu.com/5984-1/", "reference_id": "USN-5984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5984-1/" }, { "reference_url": "https://usn.ubuntu.com/5987-1/", "reference_id": "USN-5987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5987-1/" }, { "reference_url": "https://usn.ubuntu.com/5991-1/", "reference_id": "USN-5991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5991-1/" }, { "reference_url": "https://usn.ubuntu.com/6000-1/", "reference_id": "USN-6000-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6000-1/" }, { "reference_url": "https://usn.ubuntu.com/6004-1/", "reference_id": "USN-6004-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6004-1/" }, { "reference_url": "https://usn.ubuntu.com/6009-1/", "reference_id": "USN-6009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6009-1/" }, { "reference_url": "https://usn.ubuntu.com/6030-1/", "reference_id": "USN-6030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6030-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2023-0266" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r4pv-ac7b-aufb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78784?format=api", "vulnerability_id": "VCID-s3tt-1m91-afar", "summary": "kernel: smb2_write() fails to validate user supplied data which can result in out-of-bounds read", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47940.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47940.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47940", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47775", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47778", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47755", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47724", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00898", "scoring_system": "epss", "scoring_elements": "0.75644", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00898", "scoring_system": "epss", "scoring_elements": "0.75651", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00898", "scoring_system": "epss", "scoring_elements": "0.75669", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78408", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78354", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.7837", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78383", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01523", "scoring_system": "epss", "scoring_elements": "0.81306", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01523", "scoring_system": "epss", "scoring_elements": "0.81327", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01523", "scoring_system": "epss", "scoring_elements": "0.81305", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01523", "scoring_system": "epss", "scoring_elements": "0.81304", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47940" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/12/23/10", "reference_id": "10", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:56:12Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/12/23/10" }, { "reference_url": "https://github.com/torvalds/linux/commit/158a66b245739e15858de42c0ba60fcf3de9b8e6", "reference_id": "158a66b245739e15858de42c0ba60fcf3de9b8e6", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:56:12Z/" } ], "url": "https://github.com/torvalds/linux/commit/158a66b245739e15858de42c0ba60fcf3de9b8e6" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155944", "reference_id": "2155944", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155944" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.18", "reference_id": "ChangeLog-5.18.18", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:56:12Z/" } ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.18" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=158a66b245739e15858de42c0ba60fcf3de9b8e6", "reference_id": "?id=158a66b245739e15858de42c0ba60fcf3de9b8e6", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:56:12Z/" } ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=158a66b245739e15858de42c0ba60fcf3de9b8e6" }, { "reference_url": "https://usn.ubuntu.com/5851-1/", "reference_id": "USN-5851-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5851-1/" }, { "reference_url": "https://usn.ubuntu.com/5860-1/", "reference_id": "USN-5860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5860-1/" }, { "reference_url": "https://usn.ubuntu.com/5876-1/", "reference_id": "USN-5876-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5876-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-47940" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s3tt-1m91-afar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79002?format=api", "vulnerability_id": "VCID-sv4s-h2k7-aygu", "summary": "kernel: Report vmalloc UAF in dvb-core/dmxdev", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41218.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41218.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41218", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61987", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62311", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62317", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62301", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62291", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62307", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62299", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62254", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62276", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62234", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62201", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.6225", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62286", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62258", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62204", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/09/24/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/09/24/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/09/24/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/09/24/2" }, { "reference_url": "https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/", "reference_id": "20220908132754.30532-1-tiwai%40suse.de", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/" } ], "url": "https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122960", "reference_id": "2122960", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122960" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/09/23/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/09/23/4" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c", "reference_id": "dmxdev.c", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5324", "reference_id": "dsa-5324", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5324" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792", "reference_id": "?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/" } ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://usn.ubuntu.com/5915-1/", "reference_id": "USN-5915-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5915-1/" }, { "reference_url": "https://usn.ubuntu.com/5917-1/", "reference_id": "USN-5917-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5917-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5927-1/", "reference_id": "USN-5927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5927-1/" }, { "reference_url": "https://usn.ubuntu.com/5934-1/", "reference_id": "USN-5934-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5934-1/" }, { "reference_url": "https://usn.ubuntu.com/5939-1/", "reference_id": "USN-5939-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5939-1/" }, { "reference_url": "https://usn.ubuntu.com/5940-1/", "reference_id": "USN-5940-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5940-1/" }, { "reference_url": "https://usn.ubuntu.com/5951-1/", "reference_id": "USN-5951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5951-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/5981-1/", "reference_id": "USN-5981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5981-1/" }, { "reference_url": "https://usn.ubuntu.com/5982-1/", "reference_id": "USN-5982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5982-1/" }, { "reference_url": "https://usn.ubuntu.com/5984-1/", "reference_id": "USN-5984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5984-1/" }, { "reference_url": "https://usn.ubuntu.com/5987-1/", "reference_id": "USN-5987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5987-1/" }, { "reference_url": "https://usn.ubuntu.com/5991-1/", "reference_id": "USN-5991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5991-1/" }, { "reference_url": "https://usn.ubuntu.com/6000-1/", "reference_id": "USN-6000-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6000-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6004-1/", "reference_id": "USN-6004-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6004-1/" }, { "reference_url": "https://usn.ubuntu.com/6009-1/", "reference_id": "USN-6009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6009-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" }, { "reference_url": "https://usn.ubuntu.com/6024-1/", "reference_id": "USN-6024-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6024-1/" }, { "reference_url": "https://usn.ubuntu.com/6030-1/", "reference_id": "USN-6030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6030-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-41218" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sv4s-h2k7-aygu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78785?format=api", "vulnerability_id": "VCID-sybh-ybu8-mfhv", "summary": "kernel: handling of SMB2_NEGOTIATE command doesn't properly release memory which could result in DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47941.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47941.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47941", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62076", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62127", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62077", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62145", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81368", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81376", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.8139", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02012", "scoring_system": "epss", "scoring_elements": "0.83821", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02012", "scoring_system": "epss", "scoring_elements": "0.83771", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02012", "scoring_system": "epss", "scoring_elements": "0.83778", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02012", "scoring_system": "epss", "scoring_elements": "0.838", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02667", "scoring_system": "epss", "scoring_elements": "0.85822", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02667", "scoring_system": "epss", "scoring_elements": "0.85843", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02667", "scoring_system": "epss", "scoring_elements": "0.8582", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02667", "scoring_system": "epss", "scoring_elements": "0.85826", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47941" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/12/23/10", "reference_id": "10", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:58:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/12/23/10" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155945", "reference_id": "2155945", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155945" }, { "reference_url": "https://github.com/torvalds/linux/commit/aa7253c2393f6dcd6a1468b0792f6da76edad917", "reference_id": "aa7253c2393f6dcd6a1468b0792f6da76edad917", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:58:23Z/" } ], "url": "https://github.com/torvalds/linux/commit/aa7253c2393f6dcd6a1468b0792f6da76edad917" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2", "reference_id": "ChangeLog-5.19.2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:58:23Z/" } ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa7253c2393f6dcd6a1468b0792f6da76edad917", "reference_id": "?id=aa7253c2393f6dcd6a1468b0792f6da76edad917", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:58:23Z/" } ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa7253c2393f6dcd6a1468b0792f6da76edad917" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1687/", "reference_id": "ZDI-22-1687", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:58:23Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1687/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-47941" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sybh-ybu8-mfhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78980?format=api", "vulnerability_id": "VCID-t81u-wyws-r7c3", "summary": "kernel: Rate limit overflow messages in r8152 in intr_callback", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3594.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3594.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3594", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.41795", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42103", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.4204", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42092", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42104", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42127", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42089", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42064", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42115", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42018", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.41958", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.41952", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.41869", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.41728", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42075", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149024", "reference_id": "2149024", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149024" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://vuldb.com/?id.211363", "reference_id": "?id.211363", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/" } ], "url": "https://vuldb.com/?id.211363" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907", "reference_id": "?id=93e2be344a7db169b7119de21ac1bf253b8c6907", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html", "reference_id": "msg00031.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html", "reference_id": "msg00034.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901", "reference_id": "RHSA-2023:6901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724", "reference_id": "RHSA-2024:0724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404", "reference_id": "RHSA-2024:1404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1404" }, { "reference_url": "https://usn.ubuntu.com/5754-1/", "reference_id": "USN-5754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-1/" }, { "reference_url": "https://usn.ubuntu.com/5754-2/", "reference_id": "USN-5754-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5754-2/" }, { "reference_url": "https://usn.ubuntu.com/5755-1/", "reference_id": "USN-5755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-1/" }, { "reference_url": "https://usn.ubuntu.com/5755-2/", "reference_id": "USN-5755-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-1/", "reference_id": "USN-5756-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-1/" }, { "reference_url": "https://usn.ubuntu.com/5756-2/", "reference_id": "USN-5756-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-3/", "reference_id": "USN-5756-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-3/" }, { "reference_url": "https://usn.ubuntu.com/5757-1/", "reference_id": "USN-5757-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-1/" }, { "reference_url": "https://usn.ubuntu.com/5757-2/", "reference_id": "USN-5757-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-2/" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5773-1/", "reference_id": "USN-5773-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5773-1/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" }, { "reference_url": "https://usn.ubuntu.com/5779-1/", "reference_id": "USN-5779-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5779-1/" }, { "reference_url": "https://usn.ubuntu.com/5789-1/", "reference_id": "USN-5789-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5789-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3594" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t81u-wyws-r7c3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79110?format=api", "vulnerability_id": "VCID-v4c7-7k4y-ebf6", "summary": "kernel: NVME driver: null pointer dereference in drivers/nvme/target/auth.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0122.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0122.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0122", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36337", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36804", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36813", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36778", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36753", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36797", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.3678", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36721", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36499", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36468", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36378", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36264", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36872", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36903", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36737", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36788", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0122" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/01/18/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:50:28Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/01/18/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2157927", "reference_id": "2157927", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2157927" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=da0342a3aa0357795224e6283df86444e1117168", "reference_id": "?id=da0342a3aa0357795224e6283df86444e1117168", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:50:28Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=da0342a3aa0357795224e6283df86444e1117168" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230302-0002/", "reference_id": "ntap-20230302-0002", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:50:28Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230302-0002/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2023-0122" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v4c7-7k4y-ebf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78779?format=api", "vulnerability_id": "VCID-vmbf-nbfs-5bbb", "summary": "kernel: slab-out-of-bounds read vulnerabilities in cbq_classify", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23454.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23454.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23454", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11283", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11383", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11323", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1128", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11217", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11152", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18836", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18889", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.1861", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18689", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18743", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18748", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18701", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18652", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18597", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18609", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2023/01/10/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2023/01/10/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168297", "reference_id": "2168297", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168297" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2023/01/10/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2023/01/10/4" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5324", "reference_id": "dsa-5324", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5324" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12", "reference_id": "?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://usn.ubuntu.com/5915-1/", "reference_id": "USN-5915-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5915-1/" }, { "reference_url": "https://usn.ubuntu.com/5917-1/", "reference_id": "USN-5917-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5917-1/" }, { "reference_url": "https://usn.ubuntu.com/5934-1/", "reference_id": "USN-5934-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5934-1/" }, { "reference_url": "https://usn.ubuntu.com/5939-1/", "reference_id": "USN-5939-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5939-1/" }, { "reference_url": "https://usn.ubuntu.com/5940-1/", "reference_id": "USN-5940-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5940-1/" }, { "reference_url": "https://usn.ubuntu.com/5951-1/", "reference_id": "USN-5951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5951-1/" }, { "reference_url": "https://usn.ubuntu.com/5982-1/", "reference_id": "USN-5982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5982-1/" }, { "reference_url": "https://usn.ubuntu.com/5987-1/", "reference_id": "USN-5987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5987-1/" }, { "reference_url": "https://usn.ubuntu.com/6000-1/", "reference_id": "USN-6000-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6000-1/" }, { "reference_url": "https://usn.ubuntu.com/6004-1/", "reference_id": "USN-6004-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6004-1/" }, { "reference_url": "https://usn.ubuntu.com/6079-1/", "reference_id": "USN-6079-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6079-1/" }, { "reference_url": "https://usn.ubuntu.com/6091-1/", "reference_id": "USN-6091-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6091-1/" }, { "reference_url": "https://usn.ubuntu.com/6096-1/", "reference_id": "USN-6096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6096-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2023-23454" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vmbf-nbfs-5bbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79367?format=api", "vulnerability_id": "VCID-vqy7-37ym-eufr", "summary": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36879", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06944", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06975", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06971", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0682", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06984", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06842", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0686", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06921", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06925", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06932", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06935", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06904", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06863", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06849", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10686", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10552", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119855", "reference_id": "2119855", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119855" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901", "reference_id": "commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5207", "reference_id": "dsa-5207", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5207" }, { "reference_url": "https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901", "reference_id": "f85daf0e725358be78dfd208dea5fd665d8cb901", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220901-0007/", "reference_id": "ntap-20220901-0007", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220901-0007/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://usn.ubuntu.com/5667-1/", "reference_id": "USN-5667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5667-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5703-1/", "reference_id": "USN-5703-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5703-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://usn.ubuntu.com/5727-1/", "reference_id": "USN-5727-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-1/" }, { "reference_url": "https://usn.ubuntu.com/5727-2/", "reference_id": "USN-5727-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-2/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" }, { "reference_url": "https://usn.ubuntu.com/5913-1/", "reference_id": "USN-5913-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5913-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-36879" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqy7-37ym-eufr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79530?format=api", "vulnerability_id": "VCID-vrmr-8pda-m3d8", "summary": "Kernel: A use after free in __mtk_ppe_check_skb in drivers/net/ethernet/mediatek/mtk_ppe.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3636.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3636.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3636", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06209", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06251", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06292", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06282", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06279", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06268", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06226", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06239", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06605", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06588", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06612", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0639", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06419", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06632", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0676", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06571", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3636" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180984", "reference_id": "2180984", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180984" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/pabeni/net-next.git/commit/?id=17a5f6a78dc7b8db385de346092d7d9f9dc24df6", "reference_id": "?id=17a5f6a78dc7b8db385de346092d7d9f9dc24df6", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:07:51Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/pabeni/net-next.git/commit/?id=17a5f6a78dc7b8db385de346092d7d9f9dc24df6" }, { "reference_url": "https://vuldb.com/?id.211935", "reference_id": "?id.211935", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:07:51Z/" } ], "url": "https://vuldb.com/?id.211935" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3636" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vrmr-8pda-m3d8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78964?format=api", "vulnerability_id": "VCID-vu3z-hmu8-fkbn", "summary": "kernel: libbpf: NULL pointer dereference in find_prog_by_sec_insn", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3606.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3606.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3606", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05389", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05018", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04999", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.0498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04926", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04936", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05274", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05311", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05352", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05345", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05137", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05163", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04988", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05021", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05037", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3606", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3606" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717", "reference_id": "1023717", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155196", "reference_id": "2155196", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155196" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://vuldb.com/?id.211749", "reference_id": "?id.211749", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:19Z/" } ], "url": "https://vuldb.com/?id.211749" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d0d382f95a9270dcf803539d6781d6bd67e3f5b2", "reference_id": "?id=d0d382f95a9270dcf803539d6781d6bd67e3f5b2", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:19Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d0d382f95a9270dcf803539d6781d6bd67e3f5b2" }, { "reference_url": "https://usn.ubuntu.com/5759-1/", "reference_id": "USN-5759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5759-1/" }, { "reference_url": "https://usn.ubuntu.com/6215-1/", "reference_id": "USN-6215-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6215-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-5759-2/", "reference_id": "USN-USN-5759-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5759-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3606" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vu3z-hmu8-fkbn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79094?format=api", "vulnerability_id": "VCID-vzpr-mm8p-yygx", "summary": "kernel: netfilter: nf_conntrack_irc message handling issue", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2663.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2663.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2663", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.38893", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39264", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39049", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.3903", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.38947", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.38821", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39363", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39387", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39356", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39373", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39385", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39345", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39327", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39379", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39351", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123056", "reference_id": "2123056", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123056" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724", "reference_id": "RHSA-2024:0724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0724" }, { "reference_url": "https://usn.ubuntu.com/5791-1/", "reference_id": "USN-5791-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-1/" }, { "reference_url": "https://usn.ubuntu.com/5791-2/", "reference_id": "USN-5791-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-2/" }, { "reference_url": "https://usn.ubuntu.com/5791-3/", "reference_id": "USN-5791-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-3/" }, { "reference_url": "https://usn.ubuntu.com/5792-1/", "reference_id": "USN-5792-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-1/" }, { "reference_url": "https://usn.ubuntu.com/5792-2/", "reference_id": "USN-5792-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" }, { "reference_url": "https://usn.ubuntu.com/5815-1/", "reference_id": "USN-5815-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5815-1/" }, { "reference_url": "https://usn.ubuntu.com/5854-1/", "reference_id": "USN-5854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5854-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5862-1/", "reference_id": "USN-5862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5862-1/" }, { "reference_url": "https://usn.ubuntu.com/5865-1/", "reference_id": "USN-5865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5865-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" }, { "reference_url": "https://usn.ubuntu.com/6247-1/", "reference_id": "USN-6247-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6247-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-2663" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vzpr-mm8p-yygx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79545?format=api", "vulnerability_id": "VCID-wmbn-me38-gbaf", "summary": "kernel: fbdev: i740fb: divide-by-zero in drivers/video/fbdev/i740fb.c could lead to DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3061.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3061.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3061", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06762", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06574", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06591", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06608", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06615", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06634", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07158", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07184", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07264", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07261", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07247", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07237", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07169", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07163", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07204", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3061" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122526", "reference_id": "2122526", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122526" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5790-1/", "reference_id": "USN-5790-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5790-1/" }, { "reference_url": "https://usn.ubuntu.com/5791-1/", "reference_id": "USN-5791-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-1/" }, { "reference_url": "https://usn.ubuntu.com/5791-2/", "reference_id": "USN-5791-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-2/" }, { "reference_url": "https://usn.ubuntu.com/5791-3/", "reference_id": "USN-5791-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-3/" }, { "reference_url": "https://usn.ubuntu.com/5792-1/", "reference_id": "USN-5792-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-1/" }, { "reference_url": "https://usn.ubuntu.com/5792-2/", "reference_id": "USN-5792-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-2/" }, { "reference_url": "https://usn.ubuntu.com/5815-1/", "reference_id": "USN-5815-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5815-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5976-1/", "reference_id": "USN-5976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5976-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3061" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wmbn-me38-gbaf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78783?format=api", "vulnerability_id": "VCID-xdyu-fbfb-huh1", "summary": "kernel: smb2_tree_disconnect() fails to validate object existance prior to performing opertions on it", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47939.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47939.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47939", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.6474", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70472", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70458", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70432", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70648", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.7836", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78362", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78377", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78362", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78409", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78404", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78393", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.7841", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78418", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78435", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01163", "scoring_system": "epss", "scoring_elements": "0.78631", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47939" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/12/23/10", "reference_id": "10", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T18:38:17Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/12/23/10" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155943", "reference_id": "2155943", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155943" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://github.com/torvalds/linux/commit/cf6531d98190fa2cf92a6d8bbc8af0a4740a223c", "reference_id": "cf6531d98190fa2cf92a6d8bbc8af0a4740a223c", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T18:38:17Z/" } ], "url": "https://github.com/torvalds/linux/commit/cf6531d98190fa2cf92a6d8bbc8af0a4740a223c" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2", "reference_id": "ChangeLog-5.19.2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T18:38:17Z/" } ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf6531d98190fa2cf92a6d8bbc8af0a4740a223c", "reference_id": "?id=cf6531d98190fa2cf92a6d8bbc8af0a4740a223c", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T18:38:17Z/" } ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf6531d98190fa2cf92a6d8bbc8af0a4740a223c" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1690/", "reference_id": "ZDI-22-1690", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T18:38:17Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1690/" }, { "reference_url": "https://www.secpod.com/blog/zero-day-server-message-block-smb-server-in-linux-kernel-5-15-has-a-critical-vulnerability-patch-ksmbd-immediately/", "reference_id": "zero-day-server-message-block-smb-server-in-linux-kernel-5-15-has-a-critical-vulnerability-patch-ksmbd-immediately", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T18:38:17Z/" } ], "url": "https://www.secpod.com/blog/zero-day-server-message-block-smb-server-in-linux-kernel-5-15-has-a-critical-vulnerability-patch-ksmbd-immediately/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-47939" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xdyu-fbfb-huh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79123?format=api", "vulnerability_id": "VCID-xpn4-e2aq-f3d7", "summary": "kernel: use-after-free in nilfs_mdt_destroy", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2978.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2978.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2978", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05715", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18919", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1912", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19012", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18957", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18835", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20819", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20612", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20672", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20692", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20649", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20596", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20584", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20581", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20536", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2978" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120664", "reference_id": "2120664", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120664" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://usn.ubuntu.com/5650-1/", "reference_id": "USN-5650-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5650-1/" }, { "reference_url": "https://usn.ubuntu.com/5693-1/", "reference_id": "USN-5693-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5693-1/" }, { "reference_url": "https://usn.ubuntu.com/5727-1/", "reference_id": "USN-5727-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-1/" }, { "reference_url": "https://usn.ubuntu.com/5727-2/", "reference_id": "USN-5727-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-2/" }, { "reference_url": "https://usn.ubuntu.com/5728-1/", "reference_id": "USN-5728-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-1/" }, { "reference_url": "https://usn.ubuntu.com/5728-2/", "reference_id": "USN-5728-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-2/" }, { "reference_url": "https://usn.ubuntu.com/5728-3/", "reference_id": "USN-5728-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-3/" }, { "reference_url": "https://usn.ubuntu.com/5729-1/", "reference_id": "USN-5729-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5729-1/" }, { "reference_url": "https://usn.ubuntu.com/5729-2/", "reference_id": "USN-5729-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5729-2/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-2978" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xpn4-e2aq-f3d7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79073?format=api", "vulnerability_id": "VCID-xr58-t3v3-m3ep", "summary": "kernel: race condition in snd_pcm_oss_sync leads to NULL pointer dereference", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3303.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3303.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3303", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03778", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03701", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03705", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03728", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03689", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03666", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0364", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03617", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03629", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03751", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03754", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03756", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03803", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03761", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03677", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0369", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129859", "reference_id": "2129859", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129859" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://lore.kernel.org/all/CAFcO6XN7JDM4xSXGhtusQfS2mSBcx50VJKwQpCq=WeLt57aaZA%40mail.gmail.com/", "reference_id": "CAFcO6XN7JDM4xSXGhtusQfS2mSBcx50VJKwQpCq=WeLt57aaZA%40mail.gmail.com", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T15:31:25Z/" } ], "url": "https://lore.kernel.org/all/CAFcO6XN7JDM4xSXGhtusQfS2mSBcx50VJKwQpCq=WeLt57aaZA%40mail.gmail.com/" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5257", "reference_id": "dsa-5257", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T15:31:25Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5257" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d", "reference_id": "?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T15:31:25Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html", "reference_id": "msg00001.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T15:31:25Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html" }, { "reference_url": "https://usn.ubuntu.com/5791-1/", "reference_id": "USN-5791-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-1/" }, { "reference_url": "https://usn.ubuntu.com/5791-2/", "reference_id": "USN-5791-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-2/" }, { "reference_url": "https://usn.ubuntu.com/5791-3/", "reference_id": "USN-5791-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5791-3/" }, { "reference_url": "https://usn.ubuntu.com/5792-1/", "reference_id": "USN-5792-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-1/" }, { "reference_url": "https://usn.ubuntu.com/5792-2/", "reference_id": "USN-5792-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5792-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-1/", "reference_id": "USN-5793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-1/" }, { "reference_url": "https://usn.ubuntu.com/5793-2/", "reference_id": "USN-5793-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-2/" }, { "reference_url": "https://usn.ubuntu.com/5793-3/", "reference_id": "USN-5793-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-3/" }, { "reference_url": "https://usn.ubuntu.com/5793-4/", "reference_id": "USN-5793-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5793-4/" }, { "reference_url": "https://usn.ubuntu.com/5815-1/", "reference_id": "USN-5815-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5815-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" }, { "reference_url": "https://usn.ubuntu.com/6071-1/", "reference_id": "USN-6071-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6071-1/" }, { "reference_url": "https://usn.ubuntu.com/6252-1/", "reference_id": "USN-6252-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6252-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-3303" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xr58-t3v3-m3ep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78788?format=api", "vulnerability_id": "VCID-ycce-86bv-qfed", "summary": "kernel: large length in the zero DataOffset case in smb2_write() processing could result in out-of-bounds read", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47943.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47943.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47943", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01186", "scoring_system": "epss", "scoring_elements": "0.78795", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01186", "scoring_system": "epss", "scoring_elements": "0.7878", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01186", "scoring_system": "epss", "scoring_elements": "0.78762", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01186", "scoring_system": "epss", "scoring_elements": "0.78787", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01262", "scoring_system": "epss", "scoring_elements": "0.79553", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01262", "scoring_system": "epss", "scoring_elements": "0.79501", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01262", "scoring_system": "epss", "scoring_elements": "0.79517", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01262", "scoring_system": "epss", "scoring_elements": "0.79532", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01559", "scoring_system": "epss", "scoring_elements": "0.81475", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01559", "scoring_system": "epss", "scoring_elements": "0.81411", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01559", "scoring_system": "epss", "scoring_elements": "0.81487", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01559", "scoring_system": "epss", "scoring_elements": "0.81468", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01705", "scoring_system": "epss", "scoring_elements": "0.82349", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01705", "scoring_system": "epss", "scoring_elements": "0.82346", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01705", "scoring_system": "epss", "scoring_elements": "0.8237", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47943" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156340", "reference_id": "2156340", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156340" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-47943" ], "risk_score": 4.3, "exploitability": "0.5", "weighted_severity": "8.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ycce-86bv-qfed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78782?format=api", "vulnerability_id": "VCID-zs49-wp5q-9be6", "summary": "kernel: use-after-free in io_sqpoll_wait_sq", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47946.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47946.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47946", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05319", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05457", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05417", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05268", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05267", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05257", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0529", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05316", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0535", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05372", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05341", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05329", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05982", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05869", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05879", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05891", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155840", "reference_id": "2155840", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155840" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370931?format=api", "purl": "pkg:alpm/archlinux/linux-zen@6.2-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.2-1" } ], "aliases": [ "CVE-2022-47946" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zs49-wp5q-9be6" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@6.0.12-1" }