{"url":"http://public2.vulnerablecode.io/api/packages/87577?format=json","purl":"pkg:rpm/redhat/kernel@4.18.0-477.10.1?arch=el8_8","type":"rpm","namespace":"redhat","name":"kernel","version":"4.18.0-477.10.1","qualifiers":{"arch":"el8_8"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71202?format=json","vulnerability_id":"VCID-139u-14px-uucw","summary":"kernel: tunnels: do not assume mac header is set in skb_tunnel_check_pmtu()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49663.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49663.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49663","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10785","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21784","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21755","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21674","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21526","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21507","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21651","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21727","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49663"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347767","reference_id":"2347767","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347767"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49663"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-139u-14px-uucw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71096?format=json","vulnerability_id":"VCID-13xh-6qsd-rybd","summary":"kernel: rtw89: ser: fix CAM leaks occurring in L2 reset","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49539.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49539.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49539","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16374","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16313","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31931","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31935","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31896","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31862","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31895","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31874","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31679","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31551","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31469","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31902","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49539"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347661","reference_id":"2347661","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49539"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-13xh-6qsd-rybd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74254?format=json","vulnerability_id":"VCID-13zt-twd6-qbhj","summary":"kernel: net/mlx5: Fix command stats access after free","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48884.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48884.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48884","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08527","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08565","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08578","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08532","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08477","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0855","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08571","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08566","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08545","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08529","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08421","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08404","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48884"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2306405","reference_id":"2306405","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2306405"},{"reference_url":"https://git.kernel.org/stable/c/da2e552b469a0cd130ff70a88ccc4139da428a65","reference_id":"da2e552b469a0cd130ff70a88ccc4139da428a65","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:04:45Z/"}],"url":"https://git.kernel.org/stable/c/da2e552b469a0cd130ff70a88ccc4139da428a65"},{"reference_url":"https://git.kernel.org/stable/c/ddf458641a511e7dff19f3bf0cbbc5dd9fe08ce5","reference_id":"ddf458641a511e7dff19f3bf0cbbc5dd9fe08ce5","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:04:45Z/"}],"url":"https://git.kernel.org/stable/c/ddf458641a511e7dff19f3bf0cbbc5dd9fe08ce5"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-48884"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-13zt-twd6-qbhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66241?format=json","vulnerability_id":"VCID-1e46-mcb4-s3hg","summary":"kernel: md/raid0, raid10: Don't set discard sectors for request queue","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50583.json","reference_id":"","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50583.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50583","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09144","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09297","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09259","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50583"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419864","reference_id":"2419864","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419864"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50583"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1e46-mcb4-s3hg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69212?format=json","vulnerability_id":"VCID-1j33-pu3k-mudh","summary":"kernel: udmabuf: Set the DMA mask for the udmabuf device (v2)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49983.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49983.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49983","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06223","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06263","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06244","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06289","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0633","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06317","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06305","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19324","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19363","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49983"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373495","reference_id":"2373495","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49983"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1j33-pu3k-mudh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78950?format=json","vulnerability_id":"VCID-1jsv-f7pv-4bbc","summary":"kernel: use-after-free in bss_ref_get in net/wireless/scan.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42720.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42720.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42720","reference_id":"","reference_type":"","scores":[{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69451","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69502","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69509","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70805","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70787","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70884","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70878","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70833","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70848","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70863","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70841","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70824","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.7078","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134451","reference_id":"2134451","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134451"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/10/13/5","reference_id":"5","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/10/13/5"},{"reference_url":"https://security.archlinux.org/ASA-202210-1","reference_id":"ASA-202210-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-1"},{"reference_url":"https://security.archlinux.org/ASA-202210-2","reference_id":"ASA-202210-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-2"},{"reference_url":"https://security.archlinux.org/ASA-202210-3","reference_id":"ASA-202210-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-3"},{"reference_url":"https://security.archlinux.org/ASA-202210-4","reference_id":"ASA-202210-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-4"},{"reference_url":"https://security.archlinux.org/AVG-2800","reference_id":"AVG-2800","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2800"},{"reference_url":"https://security.archlinux.org/AVG-2801","reference_id":"AVG-2801","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2801"},{"reference_url":"https://security.archlinux.org/AVG-2802","reference_id":"AVG-2802","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2802"},{"reference_url":"https://security.archlinux.org/AVG-2803","reference_id":"AVG-2803","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2803"},{"reference_url":"https://www.debian.org/security/2022/dsa-5257","reference_id":"dsa-5257","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://www.debian.org/security/2022/dsa-5257"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/","reference_id":"GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f","reference_id":"?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f"},{"reference_url":"http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0090-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html","reference_id":"msg00001.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230203-0008/","reference_id":"ntap-20230203-0008","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230203-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/","reference_id":"S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1204059","reference_id":"show_bug.cgi?id=1204059","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1204059"},{"reference_url":"https://usn.ubuntu.com/5691-1/","reference_id":"USN-5691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5691-1/"},{"reference_url":"https://usn.ubuntu.com/5692-1/","reference_id":"USN-5692-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5692-1/"},{"reference_url":"https://usn.ubuntu.com/5693-1/","reference_id":"USN-5693-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5693-1/"},{"reference_url":"https://usn.ubuntu.com/5700-1/","reference_id":"USN-5700-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5700-1/"},{"reference_url":"https://usn.ubuntu.com/5708-1/","reference_id":"USN-5708-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5708-1/"},{"reference_url":"https://usn.ubuntu.com/5752-1/","reference_id":"USN-5752-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5752-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/","reference_id":"VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/"}],"fixed_packages":[],"aliases":["CVE-2022-42720"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1jsv-f7pv-4bbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71379?format=json","vulnerability_id":"VCID-1rbf-u19h-m7au","summary":"kernel: clocksource: hyper-v: unexport __init-annotated hv_init_clocksource()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49726.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49726.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49726","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20272","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20297","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20251","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20192","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20184","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20188","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20187","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20065","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2006","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20029","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20213","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49726"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347948","reference_id":"2347948","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49726"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1rbf-u19h-m7au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67136?format=json","vulnerability_id":"VCID-1tvt-98cc-u3b1","summary":"kernel: NFSD: Protect against send buffer overflow in NFSv3 READDIR","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50487.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50487.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401498","reference_id":"2401498","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401498"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0832","reference_id":"RHSA-2023:0832","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0832"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50487"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1tvt-98cc-u3b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71395?format=json","vulnerability_id":"VCID-1xfj-pphn-ebf9","summary":"kernel: scsi: sd: Fix potential NULL pointer dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49376.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49376.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49376","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23784","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24014","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2406","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24034","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23978","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23988","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23976","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23959","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23837","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23826","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49376"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/05fbde3a77a4f1d62e4c4428f384288c1f1a0be5","reference_id":"05fbde3a77a4f1d62e4c4428f384288c1f1a0be5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:41:58Z/"}],"url":"https://git.kernel.org/stable/c/05fbde3a77a4f1d62e4c4428f384288c1f1a0be5"},{"reference_url":"https://git.kernel.org/stable/c/0fcb0b131cc90c8f523a293d84c58d0c7273c96f","reference_id":"0fcb0b131cc90c8f523a293d84c58d0c7273c96f","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:41:58Z/"}],"url":"https://git.kernel.org/stable/c/0fcb0b131cc90c8f523a293d84c58d0c7273c96f"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347964","reference_id":"2347964","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347964"},{"reference_url":"https://git.kernel.org/stable/c/3733439593ad12f7b54ae35c273ea6f15d692de3","reference_id":"3733439593ad12f7b54ae35c273ea6f15d692de3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:41:58Z/"}],"url":"https://git.kernel.org/stable/c/3733439593ad12f7b54ae35c273ea6f15d692de3"},{"reference_url":"https://git.kernel.org/stable/c/78f8e96df06e2d04d82d4071c299b59d28744f47","reference_id":"78f8e96df06e2d04d82d4071c299b59d28744f47","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:41:58Z/"}],"url":"https://git.kernel.org/stable/c/78f8e96df06e2d04d82d4071c299b59d28744f47"},{"reference_url":"https://git.kernel.org/stable/c/c1f0187025905e9981000d44a92e159468b561a8","reference_id":"c1f0187025905e9981000d44a92e159468b561a8","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:41:58Z/"}],"url":"https://git.kernel.org/stable/c/c1f0187025905e9981000d44a92e159468b561a8"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49376"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xfj-pphn-ebf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69389?format=json","vulnerability_id":"VCID-21wb-96tt-bubg","summary":"kernel: drivers:md:fix a potential use-after-free bug","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50022.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50022.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50022","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06428","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06508","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06505","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06498","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06488","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19776","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19921","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19806","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50022"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373672","reference_id":"2373672","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373672"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12238","reference_id":"RHSA-2025:12238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12623","reference_id":"RHSA-2025:12623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13776","reference_id":"RHSA-2025:13776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13776"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14054","reference_id":"RHSA-2025:14054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14094","reference_id":"RHSA-2025:14094","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14094"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14746","reference_id":"RHSA-2025:14746","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14746"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14748","reference_id":"RHSA-2025:14748","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14748"}],"fixed_packages":[],"aliases":["CVE-2022-50022"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-21wb-96tt-bubg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69124?format=json","vulnerability_id":"VCID-25hy-xfqw-7kfa","summary":"kernel: stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50039.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50039.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50039","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06468","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0651","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06596","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06588","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06579","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20086","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20084","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19964","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50039"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373422","reference_id":"2373422","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50039"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-25hy-xfqw-7kfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66181?format=json","vulnerability_id":"VCID-2h8d-g1pd-9yge","summary":"kernel: RDMA/rxe: Fix \"kernel NULL pointer dereference\" error","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50671.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50671.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50671","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19753","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19648","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19821","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19764","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19739","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19741","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50671"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420356","reference_id":"2420356","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"}],"fixed_packages":[],"aliases":["CVE-2022-50671"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2h8d-g1pd-9yge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69317?format=json","vulnerability_id":"VCID-2ues-gbd9-p7b4","summary":"kernel: iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50093.json","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50093.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50093","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04742","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04774","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04789","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04823","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04835","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04824","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04801","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04781","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15132","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15089","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15097","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15146","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15186","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1519","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50093"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373601","reference_id":"2373601","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50093"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ues-gbd9-p7b4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69310?format=json","vulnerability_id":"VCID-33fn-pyce-tye1","summary":"kernel: xfrm: fix refcount leak in __xfrm_policy_check()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50007.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50007.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50007","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04953","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04988","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05042","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05058","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05038","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0502","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05002","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15618","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15574","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15634","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15677","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50007"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373594","reference_id":"2373594","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50007"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-33fn-pyce-tye1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67289?format=json","vulnerability_id":"VCID-37hp-ea1n-gbdy","summary":"kernel: scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50467.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50467.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50467","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0188","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01876","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01824","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01807","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01887","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02295","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50467"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400723","reference_id":"2400723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4447","reference_id":"RHSA-2024:4447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4447"}],"fixed_packages":[],"aliases":["CVE-2022-50467"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-37hp-ea1n-gbdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65786?format=json","vulnerability_id":"VCID-39tp-352y-ayg9","summary":"kernel: Linux kernel ALSA mts64 module: Denial of Service via null pointer dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50773.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50773.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50773","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19642","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50773"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425174","reference_id":"2425174","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425174"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50773"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-39tp-352y-ayg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69396?format=json","vulnerability_id":"VCID-3mzb-7emm-zqbk","summary":"kernel: sched/core: Do not requeue task on CPU excluded from cpus_mask","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50100.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50100.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50100","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06468","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0651","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06596","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06588","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06579","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20086","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20084","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19964","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50100"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373679","reference_id":"2373679","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50100"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3mzb-7emm-zqbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70078?format=json","vulnerability_id":"VCID-3sfr-bkpz-wqd3","summary":"kernel: net: gso: fix panic on frag_list with mixed head alloc types","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49872.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49872.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49872","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19772","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19626","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19575","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19417","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49872"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363447","reference_id":"2363447","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49872"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3sfr-bkpz-wqd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67580?format=json","vulnerability_id":"VCID-3skb-vq6z-eka1","summary":"kernel: wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50408.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50408.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50408","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02618","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02617","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02645","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02622","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02608","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02607","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02467","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02473","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0258","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02557","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50408"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/1613a7b24f1a7467cb727ba3ec77c9a808383560","reference_id":"1613a7b24f1a7467cb727ba3ec77c9a808383560","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:08:23Z/"}],"url":"https://git.kernel.org/stable/c/1613a7b24f1a7467cb727ba3ec77c9a808383560"},{"reference_url":"https://git.kernel.org/stable/c/232d59eca07f6ea27307022a33d226aff373bd02","reference_id":"232d59eca07f6ea27307022a33d226aff373bd02","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:08:23Z/"}],"url":"https://git.kernel.org/stable/c/232d59eca07f6ea27307022a33d226aff373bd02"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396506","reference_id":"2396506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396506"},{"reference_url":"https://git.kernel.org/stable/c/27574a3f421c3a1694d0207f37c6bbf23d66978e","reference_id":"27574a3f421c3a1694d0207f37c6bbf23d66978e","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:08:23Z/"}],"url":"https://git.kernel.org/stable/c/27574a3f421c3a1694d0207f37c6bbf23d66978e"},{"reference_url":"https://git.kernel.org/stable/c/3f42faf6db431e04bf942d2ebe3ae88975723478","reference_id":"3f42faf6db431e04bf942d2ebe3ae88975723478","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:08:23Z/"}],"url":"https://git.kernel.org/stable/c/3f42faf6db431e04bf942d2ebe3ae88975723478"},{"reference_url":"https://git.kernel.org/stable/c/49c742afd60f552fce7799287080db02bffe1db2","reference_id":"49c742afd60f552fce7799287080db02bffe1db2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:08:23Z/"}],"url":"https://git.kernel.org/stable/c/49c742afd60f552fce7799287080db02bffe1db2"},{"reference_url":"https://git.kernel.org/stable/c/c369836cff98d3877f98c98e15c0151462812d96","reference_id":"c369836cff98d3877f98c98e15c0151462812d96","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:08:23Z/"}],"url":"https://git.kernel.org/stable/c/c369836cff98d3877f98c98e15c0151462812d96"},{"reference_url":"https://git.kernel.org/stable/c/d79f4d903e14dde822c60b5fd3bedc5a289d25df","reference_id":"d79f4d903e14dde822c60b5fd3bedc5a289d25df","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:08:23Z/"}],"url":"https://git.kernel.org/stable/c/d79f4d903e14dde822c60b5fd3bedc5a289d25df"},{"reference_url":"https://git.kernel.org/stable/c/e01d96494a9de0f48b1167f0494f6d929fa773ed","reference_id":"e01d96494a9de0f48b1167f0494f6d929fa773ed","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:08:23Z/"}],"url":"https://git.kernel.org/stable/c/e01d96494a9de0f48b1167f0494f6d929fa773ed"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21084","reference_id":"RHSA-2025:21084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21091","reference_id":"RHSA-2025:21091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21136","reference_id":"RHSA-2025:21136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22910","reference_id":"RHSA-2025:22910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22914","reference_id":"RHSA-2025:22914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23445","reference_id":"RHSA-2025:23445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23445"}],"fixed_packages":[],"aliases":["CVE-2022-50408"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3skb-vq6z-eka1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71512?format=json","vulnerability_id":"VCID-3y91-gxhk-jfg6","summary":"kernel: net: stmmac: dwc-qos: Disable split header for Tegra194","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49642.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49642.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49642","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33319","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33278","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33255","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33294","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33271","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33235","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33086","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33069","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.32993","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33238","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33281","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49642"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348085","reference_id":"2348085","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49642"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3y91-gxhk-jfg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67368?format=json","vulnerability_id":"VCID-47d4-8hym-c3g4","summary":"kernel: x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50425.json","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50425.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50425","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04764","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04825","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0479","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04912","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04723","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05471","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50425"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400803","reference_id":"2400803","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400803"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1554","reference_id":"RHSA-2023:1554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50425"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-47d4-8hym-c3g4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65622?format=json","vulnerability_id":"VCID-48jz-f49z-h3cb","summary":"kernel: Kernel: Denial of Service via memory leak in bnxt_nvm_test()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50723.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50723.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50723","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07809","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07821","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07708","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07837","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07808","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1042","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10479","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425009","reference_id":"2425009","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50723"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-48jz-f49z-h3cb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71118?format=json","vulnerability_id":"VCID-4hsb-32rt-guem","summary":"kernel: iommu/arm-smmu-v3: check return value after calling platform_get_resource()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49319.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49319.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49319","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16383","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16446","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27982","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28311","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28377","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2842","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28424","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2838","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28322","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28334","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28313","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28267","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28172","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2806","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49319"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347683","reference_id":"2347683","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347683"},{"reference_url":"https://git.kernel.org/stable/c/54c1e0e3bbcab2abe25b2874a43050ae5df87831","reference_id":"54c1e0e3bbcab2abe25b2874a43050ae5df87831","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:43:48Z/"}],"url":"https://git.kernel.org/stable/c/54c1e0e3bbcab2abe25b2874a43050ae5df87831"},{"reference_url":"https://git.kernel.org/stable/c/54cf47da0c7532d151d76e5d63f5936191698c44","reference_id":"54cf47da0c7532d151d76e5d63f5936191698c44","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:43:48Z/"}],"url":"https://git.kernel.org/stable/c/54cf47da0c7532d151d76e5d63f5936191698c44"},{"reference_url":"https://git.kernel.org/stable/c/b131fa8c1d2afd05d0b7598621114674289c2fbb","reference_id":"b131fa8c1d2afd05d0b7598621114674289c2fbb","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:43:48Z/"}],"url":"https://git.kernel.org/stable/c/b131fa8c1d2afd05d0b7598621114674289c2fbb"},{"reference_url":"https://git.kernel.org/stable/c/db728a891f9177b044aaca89b678f6b5e24d5cc3","reference_id":"db728a891f9177b044aaca89b678f6b5e24d5cc3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:43:48Z/"}],"url":"https://git.kernel.org/stable/c/db728a891f9177b044aaca89b678f6b5e24d5cc3"},{"reference_url":"https://git.kernel.org/stable/c/fb0f1c5eb8d60b3e018ba7c87da249b52674ebe6","reference_id":"fb0f1c5eb8d60b3e018ba7c87da249b52674ebe6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:43:48Z/"}],"url":"https://git.kernel.org/stable/c/fb0f1c5eb8d60b3e018ba7c87da249b52674ebe6"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49319"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4hsb-32rt-guem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69372?format=json","vulnerability_id":"VCID-4m3h-nubx-m7fu","summary":"kernel: RDMA/rxe: Fix BUG: KASAN: null-ptr-deref in rxe_qp_do_cleanup","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50135.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50135.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50135","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07701","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07764","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50135"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373655","reference_id":"2373655","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373655"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"}],"fixed_packages":[],"aliases":["CVE-2022-50135"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4m3h-nubx-m7fu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75874?format=json","vulnerability_id":"VCID-4uam-9mxp-6qh8","summary":"kernel: mm/slub: actually fix freelist pointer vs redzoning","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47221.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47221.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-47221","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05542","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05576","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05831","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05598","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05754","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05786","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05822","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0561","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05649","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05675","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05647","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05638","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05632","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05585","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-47221"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47221","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47221"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282597","reference_id":"2282597","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282597"},{"reference_url":"https://git.kernel.org/stable/c/ce6e8bee7a3883e8008b30f5887dbb426aac6a35","reference_id":"ce6e8bee7a3883e8008b30f5887dbb426aac6a35","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:38:07Z/"}],"url":"https://git.kernel.org/stable/c/ce6e8bee7a3883e8008b30f5887dbb426aac6a35"},{"reference_url":"https://git.kernel.org/stable/c/e41a49fadbc80b60b48d3c095d9e2ee7ef7c9a8e","reference_id":"e41a49fadbc80b60b48d3c095d9e2ee7ef7c9a8e","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:38:07Z/"}],"url":"https://git.kernel.org/stable/c/e41a49fadbc80b60b48d3c095d9e2ee7ef7c9a8e"},{"reference_url":"https://git.kernel.org/stable/c/f6ed2357541612a13a5841b3af4dc32ed984a25f","reference_id":"f6ed2357541612a13a5841b3af4dc32ed984a25f","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:38:07Z/"}],"url":"https://git.kernel.org/stable/c/f6ed2357541612a13a5841b3af4dc32ed984a25f"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2021-47221"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4uam-9mxp-6qh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79284?format=json","vulnerability_id":"VCID-58sv-d9e3-rfbf","summary":"kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33655.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33655.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33655","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06243","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06504","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06293","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06306","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06455","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0647","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06492","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06291","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06378","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06371","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06355","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108691","reference_id":"2108691","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108691"},{"reference_url":"https://security.archlinux.org/AVG-2772","reference_id":"AVG-2772","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2772"},{"reference_url":"https://security.archlinux.org/AVG-2773","reference_id":"AVG-2773","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2773"},{"reference_url":"https://security.archlinux.org/AVG-2774","reference_id":"AVG-2774","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2774"},{"reference_url":"https://security.archlinux.org/AVG-2775","reference_id":"AVG-2775","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://usn.ubuntu.com/5577-1/","reference_id":"USN-5577-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5577-1/"},{"reference_url":"https://usn.ubuntu.com/5580-1/","reference_id":"USN-5580-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5580-1/"},{"reference_url":"https://usn.ubuntu.com/5596-1/","reference_id":"USN-5596-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5596-1/"},{"reference_url":"https://usn.ubuntu.com/5621-1/","reference_id":"USN-5621-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5621-1/"},{"reference_url":"https://usn.ubuntu.com/5622-1/","reference_id":"USN-5622-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5622-1/"},{"reference_url":"https://usn.ubuntu.com/5623-1/","reference_id":"USN-5623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5623-1/"},{"reference_url":"https://usn.ubuntu.com/5624-1/","reference_id":"USN-5624-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5624-1/"},{"reference_url":"https://usn.ubuntu.com/5630-1/","reference_id":"USN-5630-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5630-1/"},{"reference_url":"https://usn.ubuntu.com/5633-1/","reference_id":"USN-5633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5633-1/"},{"reference_url":"https://usn.ubuntu.com/5635-1/","reference_id":"USN-5635-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5635-1/"},{"reference_url":"https://usn.ubuntu.com/5639-1/","reference_id":"USN-5639-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5639-1/"},{"reference_url":"https://usn.ubuntu.com/5640-1/","reference_id":"USN-5640-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5640-1/"},{"reference_url":"https://usn.ubuntu.com/5644-1/","reference_id":"USN-5644-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5644-1/"},{"reference_url":"https://usn.ubuntu.com/5647-1/","reference_id":"USN-5647-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5647-1/"},{"reference_url":"https://usn.ubuntu.com/5648-1/","reference_id":"USN-5648-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5648-1/"},{"reference_url":"https://usn.ubuntu.com/5650-1/","reference_id":"USN-5650-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5650-1/"},{"reference_url":"https://usn.ubuntu.com/5652-1/","reference_id":"USN-5652-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5652-1/"},{"reference_url":"https://usn.ubuntu.com/5654-1/","reference_id":"USN-5654-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5654-1/"},{"reference_url":"https://usn.ubuntu.com/5655-1/","reference_id":"USN-5655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5655-1/"},{"reference_url":"https://usn.ubuntu.com/5660-1/","reference_id":"USN-5660-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5660-1/"},{"reference_url":"https://usn.ubuntu.com/5683-1/","reference_id":"USN-5683-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5683-1/"}],"fixed_packages":[],"aliases":["CVE-2021-33655"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-58sv-d9e3-rfbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71236?format=json","vulnerability_id":"VCID-5eak-ex5p-vkff","summary":"kernel: net: stmmac: fix dma queue left shift overflow issue","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49592.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49592","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10701","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10638","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16703","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16641","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16581","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16516","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16562","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1645","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16405","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16566","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16651","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49592"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347803","reference_id":"2347803","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347803"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49592"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5eak-ex5p-vkff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66803?format=json","vulnerability_id":"VCID-5mx2-e318-hudt","summary":"kernel: dm thin: Fix UAF in run_timer_softirq()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50563.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50563.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50563","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1939","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19107","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19186","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19239","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19244","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19198","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19143","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19102","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19112","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19012","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18956","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50563"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50563","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50563"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405757","reference_id":"2405757","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405757"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50563"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5mx2-e318-hudt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66811?format=json","vulnerability_id":"VCID-62rh-k676-37by","summary":"kernel: xfrm: Update ipcomp_scratches with NULL when freed","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50569.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50569.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50569","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1939","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19107","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19186","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19239","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19244","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19198","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19143","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19102","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19112","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19012","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18956","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50569"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50569","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50569"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405765","reference_id":"2405765","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50569"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-62rh-k676-37by"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78951?format=json","vulnerability_id":"VCID-648j-njzx-rkcf","summary":"kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42721.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42721","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06204","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06151","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06165","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06196","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06584","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06557","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06564","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06645","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06653","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06661","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06618","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06568","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134506","reference_id":"2134506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134506"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/10/13/5","reference_id":"5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/10/13/5"},{"reference_url":"https://security.archlinux.org/ASA-202210-1","reference_id":"ASA-202210-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-1"},{"reference_url":"https://security.archlinux.org/ASA-202210-2","reference_id":"ASA-202210-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-2"},{"reference_url":"https://security.archlinux.org/ASA-202210-3","reference_id":"ASA-202210-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-3"},{"reference_url":"https://security.archlinux.org/ASA-202210-4","reference_id":"ASA-202210-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-4"},{"reference_url":"https://security.archlinux.org/AVG-2800","reference_id":"AVG-2800","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2800"},{"reference_url":"https://security.archlinux.org/AVG-2801","reference_id":"AVG-2801","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2801"},{"reference_url":"https://security.archlinux.org/AVG-2802","reference_id":"AVG-2802","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2802"},{"reference_url":"https://security.archlinux.org/AVG-2803","reference_id":"AVG-2803","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2803"},{"reference_url":"https://www.debian.org/security/2022/dsa-5257","reference_id":"dsa-5257","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://www.debian.org/security/2022/dsa-5257"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/","reference_id":"GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=bcca852027e5878aec911a347407ecc88d6fff7f","reference_id":"?id=bcca852027e5878aec911a347407ecc88d6fff7f","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=bcca852027e5878aec911a347407ecc88d6fff7f"},{"reference_url":"http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0090-1.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html","reference_id":"msg00001.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230203-0008/","reference_id":"ntap-20230203-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230203-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/","reference_id":"S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1204060","reference_id":"show_bug.cgi?id=1204060","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1204060"},{"reference_url":"https://usn.ubuntu.com/5691-1/","reference_id":"USN-5691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5691-1/"},{"reference_url":"https://usn.ubuntu.com/5692-1/","reference_id":"USN-5692-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5692-1/"},{"reference_url":"https://usn.ubuntu.com/5693-1/","reference_id":"USN-5693-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5693-1/"},{"reference_url":"https://usn.ubuntu.com/5700-1/","reference_id":"USN-5700-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5700-1/"},{"reference_url":"https://usn.ubuntu.com/5708-1/","reference_id":"USN-5708-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5708-1/"},{"reference_url":"https://usn.ubuntu.com/5752-1/","reference_id":"USN-5752-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5752-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/","reference_id":"VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/"}],"fixed_packages":[],"aliases":["CVE-2022-42721"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-648j-njzx-rkcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65815?format=json","vulnerability_id":"VCID-66ca-wdys-fqhn","summary":"kernel: md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50752.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50752.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50752","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10017","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50752"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425203","reference_id":"2425203","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50752"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-66ca-wdys-fqhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67711?format=json","vulnerability_id":"VCID-67ck-v552-pua4","summary":"kernel: Drivers: vmbus: Check for channel allocation before looking up relids","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53273.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53273.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53273","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0396","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04128","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04163","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04005","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03977","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04097","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53273"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/176c6b4889195fbe7016d9401175b48c5c9edf68","reference_id":"176c6b4889195fbe7016d9401175b48c5c9edf68","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:06:11Z/"}],"url":"https://git.kernel.org/stable/c/176c6b4889195fbe7016d9401175b48c5c9edf68"},{"reference_url":"https://git.kernel.org/stable/c/1eb65c8687316c65140b48fad27133d583178e15","reference_id":"1eb65c8687316c65140b48fad27133d583178e15","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:06:11Z/"}],"url":"https://git.kernel.org/stable/c/1eb65c8687316c65140b48fad27133d583178e15"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395699","reference_id":"2395699","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395699"},{"reference_url":"https://git.kernel.org/stable/c/8c3f0ae5435fd20bb1e3a8308488aa6ac33151ee","reference_id":"8c3f0ae5435fd20bb1e3a8308488aa6ac33151ee","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:06:11Z/"}],"url":"https://git.kernel.org/stable/c/8c3f0ae5435fd20bb1e3a8308488aa6ac33151ee"},{"reference_url":"https://git.kernel.org/stable/c/a5c44f3446a0565139b7d8abc78f58b86c398123","reference_id":"a5c44f3446a0565139b7d8abc78f58b86c398123","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:06:11Z/"}],"url":"https://git.kernel.org/stable/c/a5c44f3446a0565139b7d8abc78f58b86c398123"},{"reference_url":"https://git.kernel.org/stable/c/c373e49fbb87aa177819866ed9194ebc5414dfd6","reference_id":"c373e49fbb87aa177819866ed9194ebc5414dfd6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:06:11Z/"}],"url":"https://git.kernel.org/stable/c/c373e49fbb87aa177819866ed9194ebc5414dfd6"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2023-53273"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-67ck-v552-pua4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78981?format=json","vulnerability_id":"VCID-6jc4-7c8b-4bhv","summary":"kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1195.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1195.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1195","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04263","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0419","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04202","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04221","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04093","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04113","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04132","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04116","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04102","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04076","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04069","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1195"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621","reference_id":"153695d36ead0ccc4d0256953c751cabf673e621","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:57Z/"}],"url":"https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154171","reference_id":"2154171","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0431","reference_id":"RHSA-2024:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0432","reference_id":"RHSA-2024:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0432"},{"reference_url":"https://usn.ubuntu.com/5970-1/","reference_id":"USN-5970-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5970-1/"},{"reference_url":"https://usn.ubuntu.com/5979-1/","reference_id":"USN-5979-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5979-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1195"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6jc4-7c8b-4bhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69361?format=json","vulnerability_id":"VCID-7akf-e8x5-ryd1","summary":"kernel: media: pvrusb2: fix memory leak in pvr_probe","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49982.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49982.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49982","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04953","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04988","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05042","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05058","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05038","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0502","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05002","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15618","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15574","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15634","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15677","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49982"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373644","reference_id":"2373644","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373644"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49982"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7akf-e8x5-ryd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69296?format=json","vulnerability_id":"VCID-7ds1-kkxr-b7gx","summary":"kernel: netfilter: nf_tables: possible module reference underflow in error path","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50048.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50048.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50048","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04734","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04751","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50048"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373580","reference_id":"2373580","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3421","reference_id":"RHSA-2024:3421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3421"}],"fixed_packages":[],"aliases":["CVE-2022-50048"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ds1-kkxr-b7gx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79645?format=json","vulnerability_id":"VCID-7e2m-a86y-c3bd","summary":"kernel: media: em28xx: initialize refcount before kref_get","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3239.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3239.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3239","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07509","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07455","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07588","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07549","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07539","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07466","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07505","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07487","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07546","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07568","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07554","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2127985","reference_id":"2127985","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2127985"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7933","reference_id":"RHSA-2022:7933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://usn.ubuntu.com/5757-1/","reference_id":"USN-5757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-1/"},{"reference_url":"https://usn.ubuntu.com/5757-2/","reference_id":"USN-5757-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-2/"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3239"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7e2m-a86y-c3bd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67810?format=json","vulnerability_id":"VCID-7gtj-pdmf-afg4","summary":"kernel: md: Replace snprintf with scnprintf","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50299.json","reference_id":"","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50299.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50299","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04067","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50299"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395240","reference_id":"2395240","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395240"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50299"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gtj-pdmf-afg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67837?format=json","vulnerability_id":"VCID-7zrx-s2c1-n3de","summary":"kernel: ASoC: Intel: avs: Fix potential RX buffer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50325.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50325.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50325","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01866","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01884","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02592","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02582","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02644","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02521","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0251","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02509","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02494","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02499","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50325"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395270","reference_id":"2395270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395270"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50325"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7zrx-s2c1-n3de"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65617?format=json","vulnerability_id":"VCID-8d95-uau1-j7bs","summary":"kernel: Linux kernel: Denial of Service in mt7921e driver during module unload","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50714.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50714.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50714","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50714"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425004","reference_id":"2425004","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50714"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8d95-uau1-j7bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79406?format=json","vulnerability_id":"VCID-8ekj-2sge-5kd2","summary":"kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1789.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1789.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1789","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04217","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04262","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04271","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04397","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04437","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04255","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04275","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04287","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04319","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04334","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04326","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04312","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04291","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090723","reference_id":"2090723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090723"},{"reference_url":"https://security.archlinux.org/AVG-2772","reference_id":"AVG-2772","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2772"},{"reference_url":"https://security.archlinux.org/AVG-2773","reference_id":"AVG-2773","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2773"},{"reference_url":"https://security.archlinux.org/AVG-2774","reference_id":"AVG-2774","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2774"},{"reference_url":"https://security.archlinux.org/AVG-2775","reference_id":"AVG-2775","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4447","reference_id":"RHSA-2024:4447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4447"},{"reference_url":"https://usn.ubuntu.com/5514-1/","reference_id":"USN-5514-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5514-1/"},{"reference_url":"https://usn.ubuntu.com/5518-1/","reference_id":"USN-5518-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5518-1/"},{"reference_url":"https://usn.ubuntu.com/5529-1/","reference_id":"USN-5529-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5529-1/"},{"reference_url":"https://usn.ubuntu.com/5539-1/","reference_id":"USN-5539-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5539-1/"},{"reference_url":"https://usn.ubuntu.com/5564-1/","reference_id":"USN-5564-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5564-1/"}],"fixed_packages":[],"aliases":["CVE-2022-1789"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8ekj-2sge-5kd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66075?format=json","vulnerability_id":"VCID-8h7s-de3n-3qbu","summary":"kernel: RDMA/irdma: Cap MSIX used to online CPUs + 1","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53811.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53811","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10007","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10071","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10009","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09858","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53811"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420237","reference_id":"2420237","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2023-53811"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8h7s-de3n-3qbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71562?format=json","vulnerability_id":"VCID-8t83-czys-yqag","summary":"kernel: scsi: libfc: Fix use after free in fc_exch_abts_resp()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49114.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49114.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49114","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01582","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01591","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01585","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02182","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02125","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02096","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02109","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02196","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02157","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0245","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2044","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2038","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49114"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/1d7effe5fff9d28e45e18ac3a564067c7ddfe898","reference_id":"1d7effe5fff9d28e45e18ac3a564067c7ddfe898","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T18:03:27Z/"}],"url":"https://git.kernel.org/stable/c/1d7effe5fff9d28e45e18ac3a564067c7ddfe898"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348136","reference_id":"2348136","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348136"},{"reference_url":"https://git.kernel.org/stable/c/271add11994ba1a334859069367e04d2be2ebdd4","reference_id":"271add11994ba1a334859069367e04d2be2ebdd4","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T18:03:27Z/"}],"url":"https://git.kernel.org/stable/c/271add11994ba1a334859069367e04d2be2ebdd4"},{"reference_url":"https://git.kernel.org/stable/c/412dd8299b02e4410fe77b8396953c1a8dde183a","reference_id":"412dd8299b02e4410fe77b8396953c1a8dde183a","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T18:03:27Z/"}],"url":"https://git.kernel.org/stable/c/412dd8299b02e4410fe77b8396953c1a8dde183a"},{"reference_url":"https://git.kernel.org/stable/c/499d198494e77b6533251b9b909baf5c101129cb","reference_id":"499d198494e77b6533251b9b909baf5c101129cb","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T18:03:27Z/"}],"url":"https://git.kernel.org/stable/c/499d198494e77b6533251b9b909baf5c101129cb"},{"reference_url":"https://git.kernel.org/stable/c/4a131d4ea8b581ac9b01d3a72754db4848be3232","reference_id":"4a131d4ea8b581ac9b01d3a72754db4848be3232","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T18:03:27Z/"}],"url":"https://git.kernel.org/stable/c/4a131d4ea8b581ac9b01d3a72754db4848be3232"},{"reference_url":"https://git.kernel.org/stable/c/5cf2ce8967b0d98c8cfa4dc42ef4fcf080f5c836","reference_id":"5cf2ce8967b0d98c8cfa4dc42ef4fcf080f5c836","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T18:03:27Z/"}],"url":"https://git.kernel.org/stable/c/5cf2ce8967b0d98c8cfa4dc42ef4fcf080f5c836"},{"reference_url":"https://git.kernel.org/stable/c/6044ad64f41c87382cfeeca281573d1886d80cbe","reference_id":"6044ad64f41c87382cfeeca281573d1886d80cbe","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T18:03:27Z/"}],"url":"https://git.kernel.org/stable/c/6044ad64f41c87382cfeeca281573d1886d80cbe"},{"reference_url":"https://git.kernel.org/stable/c/87909291762d08fdb60d19069d7a89b5b308d0ef","reference_id":"87909291762d08fdb60d19069d7a89b5b308d0ef","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T18:03:27Z/"}],"url":"https://git.kernel.org/stable/c/87909291762d08fdb60d19069d7a89b5b308d0ef"},{"reference_url":"https://git.kernel.org/stable/c/f581df412bc45c95176e3c808ee2839c05b2ab0c","reference_id":"f581df412bc45c95176e3c808ee2839c05b2ab0c","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T18:03:27Z/"}],"url":"https://git.kernel.org/stable/c/f581df412bc45c95176e3c808ee2839c05b2ab0c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10005","reference_id":"RHSA-2025:10005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10009","reference_id":"RHSA-2025:10009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10174","reference_id":"RHSA-2025:10174","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10174"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10179","reference_id":"RHSA-2025:10179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10193","reference_id":"RHSA-2025:10193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10193"}],"fixed_packages":[],"aliases":["CVE-2022-49114"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8t83-czys-yqag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67022?format=json","vulnerability_id":"VCID-9jqp-b3qw-dkap","summary":"kernel: Linux kernel (TIPC): Information disclosure via uninitialized memory in tipc_topsrv_kern_subscr","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50531.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50531.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50531","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.00993","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.00994","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01002","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01006","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01004","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.0099","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.00986","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.00981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.00991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.0114","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01048","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01052","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01054","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50531"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402274","reference_id":"2402274","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402274"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50531"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9jqp-b3qw-dkap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69237?format=json","vulnerability_id":"VCID-9jt2-vc3t-xuf6","summary":"kernel: openvswitch: fix memory leak at failed datapath creation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49959.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49959.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49959","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04734","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04751","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49959"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373521","reference_id":"2373521","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49959"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9jt2-vc3t-xuf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78958?format=json","vulnerability_id":"VCID-9nyv-n5f5-ekbf","summary":"kernel: memory leak in ipv6_renew_options()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3524.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3524.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3524","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18754","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18918","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18929","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18819","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18799","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19192","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18909","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18988","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19042","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19049","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18951","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18905","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150947","reference_id":"2150947","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150947"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5754-1/","reference_id":"USN-5754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-1/"},{"reference_url":"https://usn.ubuntu.com/5754-2/","reference_id":"USN-5754-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-2/"},{"reference_url":"https://usn.ubuntu.com/5755-1/","reference_id":"USN-5755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-1/"},{"reference_url":"https://usn.ubuntu.com/5755-2/","reference_id":"USN-5755-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-2/"},{"reference_url":"https://usn.ubuntu.com/5756-1/","reference_id":"USN-5756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-1/"},{"reference_url":"https://usn.ubuntu.com/5756-2/","reference_id":"USN-5756-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-2/"},{"reference_url":"https://usn.ubuntu.com/5756-3/","reference_id":"USN-5756-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-3/"},{"reference_url":"https://usn.ubuntu.com/5757-1/","reference_id":"USN-5757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-1/"},{"reference_url":"https://usn.ubuntu.com/5757-2/","reference_id":"USN-5757-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-2/"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5773-1/","reference_id":"USN-5773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5773-1/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"},{"reference_url":"https://usn.ubuntu.com/5779-1/","reference_id":"USN-5779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5779-1/"},{"reference_url":"https://usn.ubuntu.com/5780-1/","reference_id":"USN-5780-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5780-1/"},{"reference_url":"https://usn.ubuntu.com/5789-1/","reference_id":"USN-5789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5789-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3524"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9nyv-n5f5-ekbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69231?format=json","vulnerability_id":"VCID-a1fy-tmwd-c3d5","summary":"kernel: RDMA/irdma: Fix a window for use-after-free","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50137.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50137.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50137","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06814","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06864","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06949","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06948","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06937","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20529","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20675","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20563","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2056","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50137"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373514","reference_id":"2373514","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19222","reference_id":"RHSA-2025:19222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19268","reference_id":"RHSA-2025:19268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19492","reference_id":"RHSA-2025:19492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19492"}],"fixed_packages":[],"aliases":["CVE-2022-50137"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a1fy-tmwd-c3d5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69122?format=json","vulnerability_id":"VCID-aksa-szmt-w7fm","summary":"kernel: drm/i915/ttm: don't leak the ccs state","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50037.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50037.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50037","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07701","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07764","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50037"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373420","reference_id":"2373420","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50037"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aksa-szmt-w7fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71548?format=json","vulnerability_id":"VCID-apar-v1r2-7ffy","summary":"kernel: driver core: fix deadlock in __device_attach","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49371.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49371.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49371","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09467","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13856","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14037","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1409","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14035","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13998","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13947","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13852","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13846","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13949","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13923","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49371"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348122","reference_id":"2348122","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348122"},{"reference_url":"https://git.kernel.org/stable/c/34fdd9b7def9d2fcb71bb7b0bc4848dd7313767e","reference_id":"34fdd9b7def9d2fcb71bb7b0bc4848dd7313767e","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:17Z/"}],"url":"https://git.kernel.org/stable/c/34fdd9b7def9d2fcb71bb7b0bc4848dd7313767e"},{"reference_url":"https://git.kernel.org/stable/c/36ee9ffca8ef56c302f2855c4a5fccf61c0c1ada","reference_id":"36ee9ffca8ef56c302f2855c4a5fccf61c0c1ada","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:17Z/"}],"url":"https://git.kernel.org/stable/c/36ee9ffca8ef56c302f2855c4a5fccf61c0c1ada"},{"reference_url":"https://git.kernel.org/stable/c/593b595332bd2d65e1a5c1ae7897996c157f5468","reference_id":"593b595332bd2d65e1a5c1ae7897996c157f5468","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:17Z/"}],"url":"https://git.kernel.org/stable/c/593b595332bd2d65e1a5c1ae7897996c157f5468"},{"reference_url":"https://git.kernel.org/stable/c/b232b02bf3c205b13a26dcec08e53baddd8e59ed","reference_id":"b232b02bf3c205b13a26dcec08e53baddd8e59ed","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:17Z/"}],"url":"https://git.kernel.org/stable/c/b232b02bf3c205b13a26dcec08e53baddd8e59ed"},{"reference_url":"https://git.kernel.org/stable/c/d53a227bfcd5160ce1b61d9954901968a20651e7","reference_id":"d53a227bfcd5160ce1b61d9954901968a20651e7","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:17Z/"}],"url":"https://git.kernel.org/stable/c/d53a227bfcd5160ce1b61d9954901968a20651e7"},{"reference_url":"https://git.kernel.org/stable/c/df6de52b80aa3b46f5ac804412355ffe2e1df93e","reference_id":"df6de52b80aa3b46f5ac804412355ffe2e1df93e","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:17Z/"}],"url":"https://git.kernel.org/stable/c/df6de52b80aa3b46f5ac804412355ffe2e1df93e"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49371"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-apar-v1r2-7ffy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69279?format=json","vulnerability_id":"VCID-artu-ugr9-9yax","summary":"kernel: ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50016.json","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50016.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50016","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07701","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07764","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50016"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373563","reference_id":"2373563","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50016"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-artu-ugr9-9yax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76462?format=json","vulnerability_id":"VCID-b5zg-fwep-e3af","summary":"kernel: ALSA: usb-audio: ALSA USB Audio Out-of-Bounds Bug","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48701.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48701.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48701","reference_id":"","reference_type":"","scores":[{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00583","published_at":"2026-04-02T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00578","published_at":"2026-04-07T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00577","published_at":"2026-04-04T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00576","published_at":"2026-04-08T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00569","published_at":"2026-04-09T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.0057","published_at":"2026-04-11T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00566","published_at":"2026-04-12T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00568","published_at":"2026-04-13T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00744","published_at":"2026-04-24T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00743","published_at":"2026-04-29T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00694","published_at":"2026-04-16T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00745","published_at":"2026-04-26T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.007","published_at":"2026-04-18T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00741","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48701"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/0492798bf8dfcc09c9337a1ba065da1d1ca68712","reference_id":"0492798bf8dfcc09c9337a1ba065da1d1ca68712","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:55Z/"}],"url":"https://git.kernel.org/stable/c/0492798bf8dfcc09c9337a1ba065da1d1ca68712"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278950","reference_id":"2278950","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278950"},{"reference_url":"https://git.kernel.org/stable/c/2a308e415d247a23d4d64c964c02e782eede2936","reference_id":"2a308e415d247a23d4d64c964c02e782eede2936","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:55Z/"}],"url":"https://git.kernel.org/stable/c/2a308e415d247a23d4d64c964c02e782eede2936"},{"reference_url":"https://git.kernel.org/stable/c/6123bec8480d23369e2ee0b2208611619f269faf","reference_id":"6123bec8480d23369e2ee0b2208611619f269faf","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:55Z/"}],"url":"https://git.kernel.org/stable/c/6123bec8480d23369e2ee0b2208611619f269faf"},{"reference_url":"https://git.kernel.org/stable/c/8293e61bbf908b18ff9935238d4fc2ad359e3fe0","reference_id":"8293e61bbf908b18ff9935238d4fc2ad359e3fe0","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:55Z/"}],"url":"https://git.kernel.org/stable/c/8293e61bbf908b18ff9935238d4fc2ad359e3fe0"},{"reference_url":"https://git.kernel.org/stable/c/91904870370fd986c29719846ed76d559de43251","reference_id":"91904870370fd986c29719846ed76d559de43251","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:55Z/"}],"url":"https://git.kernel.org/stable/c/91904870370fd986c29719846ed76d559de43251"},{"reference_url":"https://git.kernel.org/stable/c/98e8e67395cc6d0cdf3a771f86ea42d0ee6e59dd","reference_id":"98e8e67395cc6d0cdf3a771f86ea42d0ee6e59dd","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:55Z/"}],"url":"https://git.kernel.org/stable/c/98e8e67395cc6d0cdf3a771f86ea42d0ee6e59dd"},{"reference_url":"https://git.kernel.org/stable/c/b970518014f2f0f6c493fb86c1e092b936899061","reference_id":"b970518014f2f0f6c493fb86c1e092b936899061","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:55Z/"}],"url":"https://git.kernel.org/stable/c/b970518014f2f0f6c493fb86c1e092b936899061"},{"reference_url":"https://git.kernel.org/stable/c/e53f47f6c1a56d2af728909f1cb894da6b43d9bf","reference_id":"e53f47f6c1a56d2af728909f1cb894da6b43d9bf","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:55Z/"}],"url":"https://git.kernel.org/stable/c/e53f47f6c1a56d2af728909f1cb894da6b43d9bf"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17109","reference_id":"RHSA-2025:17109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17161","reference_id":"RHSA-2025:17161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21084","reference_id":"RHSA-2025:21084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21091","reference_id":"RHSA-2025:21091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21136","reference_id":"RHSA-2025:21136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23445","reference_id":"RHSA-2025:23445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23445"}],"fixed_packages":[],"aliases":["CVE-2022-48701"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b5zg-fwep-e3af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65594?format=json","vulnerability_id":"VCID-ba3a-11hz-q7e4","summary":"kernel: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50698.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50698.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50698","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10146","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10199","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50698"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424979","reference_id":"2424979","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50698"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ba3a-11hz-q7e4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67377?format=json","vulnerability_id":"VCID-bf3x-s32e-rya5","summary":"kernel: ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50431.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50431.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50431","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50431"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400812","reference_id":"2400812","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50431"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bf3x-s32e-rya5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69344?format=json","vulnerability_id":"VCID-bja8-gn8x-1yam","summary":"kernel: net: qrtr: start MHI channel after endpoit creation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50044.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50044.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50044","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02691","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02701","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02722","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02695","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0268","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02677","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11231","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11269","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1127","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11397","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11339","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11295","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50044"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373627","reference_id":"2373627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14744","reference_id":"RHSA-2025:14744","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14744"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14749","reference_id":"RHSA-2025:14749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14749"}],"fixed_packages":[],"aliases":["CVE-2022-50044"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bja8-gn8x-1yam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65433?format=json","vulnerability_id":"VCID-bnab-yqvd-fbbe","summary":"kernel: ASoC: pxa: fix null-pointer dereference in filter()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50866.json","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50866.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50866","reference_id":"","reference_type":"","scores":[{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20529","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20588","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20398","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20456","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.2048","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20379","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20369","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.2037","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20366","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20241","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20237","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20203","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50866"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50866","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50866"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426212","reference_id":"2426212","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426212"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50866"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bnab-yqvd-fbbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80174?format=json","vulnerability_id":"VCID-bpkg-a38v-53dv","summary":"kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20141.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20141.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-20141","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05773","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05806","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05842","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05836","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05882","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05873","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05865","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0583","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05841","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05995","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06026","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06062","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06066","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-20141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20141"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2114937","reference_id":"2114937","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2114937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5540-1/","reference_id":"USN-5540-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5540-1/"}],"fixed_packages":[],"aliases":["CVE-2022-20141"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bpkg-a38v-53dv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69379?format=json","vulnerability_id":"VCID-bwjb-jqgu-dfdt","summary":"kernel: md-raid10: fix KASAN warning","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50211.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50211.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50211","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04579","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04616","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04628","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04675","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04669","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04651","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14812","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14766","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14773","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14832","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14868","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1487","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50211"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373662","reference_id":"2373662","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15656","reference_id":"RHSA-2025:15656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17109","reference_id":"RHSA-2025:17109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17124","reference_id":"RHSA-2025:17124","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17159","reference_id":"RHSA-2025:17159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17161","reference_id":"RHSA-2025:17161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17192","reference_id":"RHSA-2025:17192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"}],"fixed_packages":[],"aliases":["CVE-2022-50211"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bwjb-jqgu-dfdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69104?format=json","vulnerability_id":"VCID-c8na-dwbx-ekbv","summary":"kernel: USB: core: Prevent nested device-reset calls","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49936.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49936.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49936","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04953","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04988","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05042","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05058","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05038","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0502","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05002","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15618","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15574","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15634","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15677","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49936"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373402","reference_id":"2373402","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49936"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c8na-dwbx-ekbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71529?format=json","vulnerability_id":"VCID-c8rj-qvep-nydc","summary":"kernel: net: ipv6: unexport __init-annotated seg6_hmac_init()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49339.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49339.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49339","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1049","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10422","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26161","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2617","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26124","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26065","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26069","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26047","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26013","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25953","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25949","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.259","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26046","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26112","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49339"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348103","reference_id":"2348103","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"}],"fixed_packages":[],"aliases":["CVE-2022-49339"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c8rj-qvep-nydc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73518?format=json","vulnerability_id":"VCID-ccyr-3jce-nbfr","summary":"kernel: hwmon: (coretemp) Check for null before removing sysfs attrs","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49010.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49010","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0162","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01747","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01634","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01609","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01598","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01612","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01704","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01716","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0171","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01626","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49010"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/070d5ea4a0592a37ad96ce7f7b6b024f90bb009f","reference_id":"070d5ea4a0592a37ad96ce7f7b6b024f90bb009f","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:13:58Z/"}],"url":"https://git.kernel.org/stable/c/070d5ea4a0592a37ad96ce7f7b6b024f90bb009f"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320780","reference_id":"2320780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320780"},{"reference_url":"https://git.kernel.org/stable/c/280110db1a7d62ad635b103bafc3ae96e8bef75c","reference_id":"280110db1a7d62ad635b103bafc3ae96e8bef75c","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:13:58Z/"}],"url":"https://git.kernel.org/stable/c/280110db1a7d62ad635b103bafc3ae96e8bef75c"},{"reference_url":"https://git.kernel.org/stable/c/7692700ac818866d138a8de555130a6e70e6ac16","reference_id":"7692700ac818866d138a8de555130a6e70e6ac16","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:13:58Z/"}],"url":"https://git.kernel.org/stable/c/7692700ac818866d138a8de555130a6e70e6ac16"},{"reference_url":"https://git.kernel.org/stable/c/89eecabe6a47403237f45aafd7d24f93cb973653","reference_id":"89eecabe6a47403237f45aafd7d24f93cb973653","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:13:58Z/"}],"url":"https://git.kernel.org/stable/c/89eecabe6a47403237f45aafd7d24f93cb973653"},{"reference_url":"https://git.kernel.org/stable/c/a89ff5f5cc64b9fe7a992cf56988fd36f56ca82a","reference_id":"a89ff5f5cc64b9fe7a992cf56988fd36f56ca82a","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:13:58Z/"}],"url":"https://git.kernel.org/stable/c/a89ff5f5cc64b9fe7a992cf56988fd36f56ca82a"},{"reference_url":"https://git.kernel.org/stable/c/ae6c8b6e5d5628df1c475c0a8fca1465e205c95b","reference_id":"ae6c8b6e5d5628df1c475c0a8fca1465e205c95b","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:13:58Z/"}],"url":"https://git.kernel.org/stable/c/ae6c8b6e5d5628df1c475c0a8fca1465e205c95b"},{"reference_url":"https://git.kernel.org/stable/c/f06e0cd01eab954bd5f2190c9faa79bb5357e05b","reference_id":"f06e0cd01eab954bd5f2190c9faa79bb5357e05b","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:13:58Z/"}],"url":"https://git.kernel.org/stable/c/f06e0cd01eab954bd5f2190c9faa79bb5357e05b"},{"reference_url":"https://git.kernel.org/stable/c/fb503d077ff7b43913503eaf72995d1239028b99","reference_id":"fb503d077ff7b43913503eaf72995d1239028b99","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:13:58Z/"}],"url":"https://git.kernel.org/stable/c/fb503d077ff7b43913503eaf72995d1239028b99"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49010"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ccyr-3jce-nbfr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78970?format=json","vulnerability_id":"VCID-ckqp-r5m2-j3fx","summary":"kernel: data races around sk->sk_prot","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3567.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3567.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3567","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06395","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06443","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06487","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06481","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06475","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06463","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.064","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0641","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06792","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06819","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06795","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06659","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06615","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.068","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143943","reference_id":"2143943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143943"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://vuldb.com/?id.211090","reference_id":"?id.211090","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:29Z/"}],"url":"https://vuldb.com/?id.211090"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6","reference_id":"?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:29Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5754-1/","reference_id":"USN-5754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-1/"},{"reference_url":"https://usn.ubuntu.com/5754-2/","reference_id":"USN-5754-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-2/"},{"reference_url":"https://usn.ubuntu.com/5755-1/","reference_id":"USN-5755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-1/"},{"reference_url":"https://usn.ubuntu.com/5755-2/","reference_id":"USN-5755-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-2/"},{"reference_url":"https://usn.ubuntu.com/5756-1/","reference_id":"USN-5756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-1/"},{"reference_url":"https://usn.ubuntu.com/5756-2/","reference_id":"USN-5756-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-2/"},{"reference_url":"https://usn.ubuntu.com/5756-3/","reference_id":"USN-5756-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-3/"},{"reference_url":"https://usn.ubuntu.com/5757-1/","reference_id":"USN-5757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-1/"},{"reference_url":"https://usn.ubuntu.com/5757-2/","reference_id":"USN-5757-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-2/"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5773-1/","reference_id":"USN-5773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5773-1/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"},{"reference_url":"https://usn.ubuntu.com/5779-1/","reference_id":"USN-5779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5779-1/"},{"reference_url":"https://usn.ubuntu.com/5789-1/","reference_id":"USN-5789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5789-1/"},{"reference_url":"https://usn.ubuntu.com/5914-1/","reference_id":"USN-5914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5914-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3567"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ckqp-r5m2-j3fx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69125?format=json","vulnerability_id":"VCID-czy7-c6h9-aub4","summary":"kernel: ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50050.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50050.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50050","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05137","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05159","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05192","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05181","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05164","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16018","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16114","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16132","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16059","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16057","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50050"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373423","reference_id":"2373423","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19268","reference_id":"RHSA-2025:19268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19492","reference_id":"RHSA-2025:19492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21084","reference_id":"RHSA-2025:21084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"}],"fixed_packages":[],"aliases":["CVE-2022-50050"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-czy7-c6h9-aub4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78917?format=json","vulnerability_id":"VCID-d14e-jv1a-w7d3","summary":"kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3619.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3619","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0754","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07597","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07521","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0751","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07649","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07596","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0753","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0757","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07547","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07606","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07625","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3619"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154235","reference_id":"2154235","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154235"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://vuldb.com/?id.211918","reference_id":"?id.211918","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:20Z/"}],"url":"https://vuldb.com/?id.211918"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193","reference_id":"?id=97097c85c088e11651146da32a4e1cdb9dfa6193","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:20Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5780-1/","reference_id":"USN-5780-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5780-1/"},{"reference_url":"https://usn.ubuntu.com/5850-1/","reference_id":"USN-5850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5850-1/"},{"reference_url":"https://usn.ubuntu.com/5851-1/","reference_id":"USN-5851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5851-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5876-1/","reference_id":"USN-5876-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5876-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5878-1/","reference_id":"USN-5878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5878-1/"},{"reference_url":"https://usn.ubuntu.com/5879-1/","reference_id":"USN-5879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5879-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3619"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d14e-jv1a-w7d3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69264?format=json","vulnerability_id":"VCID-dck8-t9k8-hqaz","summary":"kernel: RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50136.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50136.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50136","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06275","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06321","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06361","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06353","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06348","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06298","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06337","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19455","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50136"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373548","reference_id":"2373548","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50136"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dck8-t9k8-hqaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71095?format=json","vulnerability_id":"VCID-dn9y-4124-7fdf","summary":"kernel: iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49323.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49323.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49323","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16446","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16383","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2842","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28424","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2838","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28322","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28334","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28313","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28267","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28172","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2806","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27982","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28311","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28377","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347660","reference_id":"2347660","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347660"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49323"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dn9y-4124-7fdf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78962?format=json","vulnerability_id":"VCID-dqhd-grev-t3ge","summary":"kernel: use-after-free related to leaf anon_vma double reuse","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42703","reference_id":"","reference_type":"","scores":[{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76875","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76866","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76906","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76773","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76783","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76824","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76833","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76827","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133483","reference_id":"2133483","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133483"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1091","reference_id":"RHSA-2023:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1092","reference_id":"RHSA-2023:1092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3388","reference_id":"RHSA-2023:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4137","reference_id":"RHSA-2023:4137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4138","reference_id":"RHSA-2023:4138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4138"},{"reference_url":"https://usn.ubuntu.com/5728-1/","reference_id":"USN-5728-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-1/"},{"reference_url":"https://usn.ubuntu.com/5728-2/","reference_id":"USN-5728-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-2/"},{"reference_url":"https://usn.ubuntu.com/5728-3/","reference_id":"USN-5728-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-3/"},{"reference_url":"https://usn.ubuntu.com/5755-1/","reference_id":"USN-5755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-1/"},{"reference_url":"https://usn.ubuntu.com/5755-2/","reference_id":"USN-5755-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-2/"},{"reference_url":"https://usn.ubuntu.com/5756-1/","reference_id":"USN-5756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-1/"},{"reference_url":"https://usn.ubuntu.com/5756-2/","reference_id":"USN-5756-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-2/"},{"reference_url":"https://usn.ubuntu.com/5756-3/","reference_id":"USN-5756-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-3/"},{"reference_url":"https://usn.ubuntu.com/5757-1/","reference_id":"USN-5757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-1/"},{"reference_url":"https://usn.ubuntu.com/5757-2/","reference_id":"USN-5757-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-2/"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5773-1/","reference_id":"USN-5773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5773-1/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"},{"reference_url":"https://usn.ubuntu.com/5779-1/","reference_id":"USN-5779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5779-1/"},{"reference_url":"https://usn.ubuntu.com/5789-1/","reference_id":"USN-5789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5789-1/"},{"reference_url":"https://usn.ubuntu.com/5916-1/","reference_id":"USN-5916-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5916-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42703"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqhd-grev-t3ge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78968?format=json","vulnerability_id":"VCID-dqth-c54y-e7fb","summary":"kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3566.json","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3566.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3566","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06857","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06912","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06943","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06942","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06934","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06869","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06853","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07191","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07169","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07127","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07111","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07055","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07161","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3566"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143893","reference_id":"2143893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143893"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://vuldb.com/?id.211089","reference_id":"?id.211089","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:33Z/"}],"url":"https://vuldb.com/?id.211089"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57","reference_id":"?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:33Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5754-1/","reference_id":"USN-5754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-1/"},{"reference_url":"https://usn.ubuntu.com/5754-2/","reference_id":"USN-5754-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-2/"},{"reference_url":"https://usn.ubuntu.com/5755-1/","reference_id":"USN-5755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-1/"},{"reference_url":"https://usn.ubuntu.com/5755-2/","reference_id":"USN-5755-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-2/"},{"reference_url":"https://usn.ubuntu.com/5756-1/","reference_id":"USN-5756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-1/"},{"reference_url":"https://usn.ubuntu.com/5756-2/","reference_id":"USN-5756-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-2/"},{"reference_url":"https://usn.ubuntu.com/5756-3/","reference_id":"USN-5756-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-3/"},{"reference_url":"https://usn.ubuntu.com/5757-1/","reference_id":"USN-5757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-1/"},{"reference_url":"https://usn.ubuntu.com/5757-2/","reference_id":"USN-5757-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-2/"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5773-1/","reference_id":"USN-5773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5773-1/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"},{"reference_url":"https://usn.ubuntu.com/5779-1/","reference_id":"USN-5779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5779-1/"},{"reference_url":"https://usn.ubuntu.com/5789-1/","reference_id":"USN-5789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5789-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3566"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqth-c54y-e7fb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69146?format=json","vulnerability_id":"VCID-dtpt-qbdh-vqhv","summary":"kernel: ASoC: DPCM: Don't pick up BE without substream","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50049.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50049.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50049","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04734","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04751","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373440","reference_id":"2373440","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50049"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dtpt-qbdh-vqhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67054?format=json","vulnerability_id":"VCID-dzhn-g8fd-4yg1","summary":"kernel: fs: dlm: fix invalid derefence of sb_lvbptr","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50516.json","reference_id":"","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50516.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50516","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05671","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05711","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05704","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05744","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0577","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05747","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0574","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05734","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0569","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05701","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05883","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05919","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05929","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50516"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402307","reference_id":"2402307","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50516"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dzhn-g8fd-4yg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65668?format=json","vulnerability_id":"VCID-e88e-ghac-1fhp","summary":"kernel: md/raid1: stop mdx_raid1 thread when raid1 array run failed","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50715.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50715.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50715","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19642","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50715"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425055","reference_id":"2425055","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50715"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e88e-ghac-1fhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71704?format=json","vulnerability_id":"VCID-ead1-5zf1-rkft","summary":"kernel: drm/i915: fix a possible refcount leak in intel_dp_add_mst_connector()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49644.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49644.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49644","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21932","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.2193","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21974","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21979","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21981","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22041","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22068","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34581","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34692","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34672","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49644"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348280","reference_id":"2348280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348280"},{"reference_url":"https://git.kernel.org/stable/c/505114dda5bbfd07f4ce9a2df5b7d8ef5f2a1218","reference_id":"505114dda5bbfd07f4ce9a2df5b7d8ef5f2a1218","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:51Z/"}],"url":"https://git.kernel.org/stable/c/505114dda5bbfd07f4ce9a2df5b7d8ef5f2a1218"},{"reference_url":"https://git.kernel.org/stable/c/592f3bad00b7e2a95a6fb7a4f9e742c061c9c3c1","reference_id":"592f3bad00b7e2a95a6fb7a4f9e742c061c9c3c1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:51Z/"}],"url":"https://git.kernel.org/stable/c/592f3bad00b7e2a95a6fb7a4f9e742c061c9c3c1"},{"reference_url":"https://git.kernel.org/stable/c/72f231b9a88abcfac9f5ddaa1a0aacb3f9f87ba5","reference_id":"72f231b9a88abcfac9f5ddaa1a0aacb3f9f87ba5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:51Z/"}],"url":"https://git.kernel.org/stable/c/72f231b9a88abcfac9f5ddaa1a0aacb3f9f87ba5"},{"reference_url":"https://git.kernel.org/stable/c/85144df9ff4652816448369de76897c57cbb1b93","reference_id":"85144df9ff4652816448369de76897c57cbb1b93","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:51Z/"}],"url":"https://git.kernel.org/stable/c/85144df9ff4652816448369de76897c57cbb1b93"},{"reference_url":"https://git.kernel.org/stable/c/a91522b4279bebb098106a19b91f82b9c3213be9","reference_id":"a91522b4279bebb098106a19b91f82b9c3213be9","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:51Z/"}],"url":"https://git.kernel.org/stable/c/a91522b4279bebb098106a19b91f82b9c3213be9"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49644"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ead1-5zf1-rkft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67530?format=json","vulnerability_id":"VCID-eedf-zky6-syc9","summary":"kernel: md: fix a crash in mempool_free","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50381.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50381.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50381","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02191","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02195","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02189","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02212","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02188","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02172","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02168","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02063","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02075","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02161","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02129","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02121","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02147","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50381"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396420","reference_id":"2396420","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50381"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eedf-zky6-syc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69173?format=json","vulnerability_id":"VCID-eg5e-cqf7-53d5","summary":"kernel: mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50172.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50172.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50172","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06223","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06263","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06244","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06289","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0633","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06317","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06305","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19324","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19363","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50172"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50172","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50172"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373456","reference_id":"2373456","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373456"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50172"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eg5e-cqf7-53d5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79188?format=json","vulnerability_id":"VCID-ejj4-yt8j-c7fm","summary":"kernel: race condition in xfrm_probe_algs can lead to OOB read/write","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3028.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3028","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01259","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01263","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0127","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02045","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02077","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02084","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02078","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02098","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02075","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0206","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02056","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02032","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122228","reference_id":"2122228","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122228"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5650-1/","reference_id":"USN-5650-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5650-1/"},{"reference_url":"https://usn.ubuntu.com/5693-1/","reference_id":"USN-5693-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5693-1/"},{"reference_url":"https://usn.ubuntu.com/5727-1/","reference_id":"USN-5727-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5727-1/"},{"reference_url":"https://usn.ubuntu.com/5727-2/","reference_id":"USN-5727-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5727-2/"},{"reference_url":"https://usn.ubuntu.com/5728-1/","reference_id":"USN-5728-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-1/"},{"reference_url":"https://usn.ubuntu.com/5728-2/","reference_id":"USN-5728-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-2/"},{"reference_url":"https://usn.ubuntu.com/5728-3/","reference_id":"USN-5728-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-3/"},{"reference_url":"https://usn.ubuntu.com/5729-1/","reference_id":"USN-5729-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5729-1/"},{"reference_url":"https://usn.ubuntu.com/5729-2/","reference_id":"USN-5729-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5729-2/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3028"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ejj4-yt8j-c7fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67000?format=json","vulnerability_id":"VCID-ekd9-hkep-7qfm","summary":"kernel: dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50549.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50549.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50549","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0147","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01473","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01479","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01484","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01486","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01472","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01462","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01731","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01573","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0157","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0158","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50549"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402251","reference_id":"2402251","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402251"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50549"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ekd9-hkep-7qfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67490?format=json","vulnerability_id":"VCID-ekrb-1s2x-dufm","summary":"kernel: RDMA/mlx5: Fix mlx5_ib_get_hw_stats when used for device","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53393.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53393","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04377","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04437","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04227","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04397","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04236","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04362","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53393"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396376","reference_id":"2396376","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396376"},{"reference_url":"https://git.kernel.org/stable/c/38b50aa44495d5eb4218f0b82fc2da76505cec53","reference_id":"38b50aa44495d5eb4218f0b82fc2da76505cec53","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:59:26Z/"}],"url":"https://git.kernel.org/stable/c/38b50aa44495d5eb4218f0b82fc2da76505cec53"},{"reference_url":"https://git.kernel.org/stable/c/8d89870d63758363b07ace5c2df82d6bf865f78b","reference_id":"8d89870d63758363b07ace5c2df82d6bf865f78b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:59:26Z/"}],"url":"https://git.kernel.org/stable/c/8d89870d63758363b07ace5c2df82d6bf865f78b"},{"reference_url":"https://git.kernel.org/stable/c/9a97da4674b890b4c28f5f12beba8c33a9cd2f49","reference_id":"9a97da4674b890b4c28f5f12beba8c33a9cd2f49","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:59:26Z/"}],"url":"https://git.kernel.org/stable/c/9a97da4674b890b4c28f5f12beba8c33a9cd2f49"},{"reference_url":"https://git.kernel.org/stable/c/e597b003c736217b0c99ccf1b240c25009105238","reference_id":"e597b003c736217b0c99ccf1b240c25009105238","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:59:26Z/"}],"url":"https://git.kernel.org/stable/c/e597b003c736217b0c99ccf1b240c25009105238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22006","reference_id":"RHSA-2025:22006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22066","reference_id":"RHSA-2025:22066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22087","reference_id":"RHSA-2025:22087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22087"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23445","reference_id":"RHSA-2025:23445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23463","reference_id":"RHSA-2025:23463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23463"}],"fixed_packages":[],"aliases":["CVE-2023-53393"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ekrb-1s2x-dufm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71787?format=json","vulnerability_id":"VCID-ewej-5s1a-bbek","summary":"kernel: sock: redo the psock vs ULP protection check","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49732.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49732.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49732","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02597","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02558","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02545","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02533","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02469","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02472","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02493","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02464","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02463","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02447","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02454","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08329","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08382","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49732"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348409","reference_id":"2348409","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348409"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49732"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ewej-5s1a-bbek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71642?format=json","vulnerability_id":"VCID-exh5-yp4u-eqcg","summary":"kernel: mt76: fix use-after-free by removing a non-RCU wcid pointer","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49328.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49328.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49328","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01959","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01945","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03743","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03573","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03546","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03559","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03685","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03692","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03696","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1942","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19372","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19363","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19415","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2127","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49328"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49328","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49328"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348217","reference_id":"2348217","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348217"},{"reference_url":"https://git.kernel.org/stable/c/4448327b41738dbfcda680eb4935ff835568f468","reference_id":"4448327b41738dbfcda680eb4935ff835568f468","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:47Z/"}],"url":"https://git.kernel.org/stable/c/4448327b41738dbfcda680eb4935ff835568f468"},{"reference_url":"https://git.kernel.org/stable/c/51fb1278aa57ae0fc54adaa786e1965362bed4fb","reference_id":"51fb1278aa57ae0fc54adaa786e1965362bed4fb","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:47Z/"}],"url":"https://git.kernel.org/stable/c/51fb1278aa57ae0fc54adaa786e1965362bed4fb"},{"reference_url":"https://git.kernel.org/stable/c/d5f77f1dbb59feae81f88e44551e8e1d8a802d9a","reference_id":"d5f77f1dbb59feae81f88e44551e8e1d8a802d9a","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:47Z/"}],"url":"https://git.kernel.org/stable/c/d5f77f1dbb59feae81f88e44551e8e1d8a802d9a"},{"reference_url":"https://git.kernel.org/stable/c/e55bcdd0bf34a8b10d45ce80ebb3164c5292a17d","reference_id":"e55bcdd0bf34a8b10d45ce80ebb3164c5292a17d","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:47Z/"}],"url":"https://git.kernel.org/stable/c/e55bcdd0bf34a8b10d45ce80ebb3164c5292a17d"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10179","reference_id":"RHSA-2025:10179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10828","reference_id":"RHSA-2025:10828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9493","reference_id":"RHSA-2025:9493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9494","reference_id":"RHSA-2025:9494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9498","reference_id":"RHSA-2025:9498","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9498"}],"fixed_packages":[],"aliases":["CVE-2022-49328"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-exh5-yp4u-eqcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79602?format=json","vulnerability_id":"VCID-ezb4-x5pv-myhe","summary":"hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26341.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26341.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26341","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15515","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15626","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15425","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15513","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15563","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15526","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15489","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15422","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15343","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15348","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15399","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15444","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15442","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26341"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061703","reference_id":"2061703","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1877","reference_id":"RHSA-2024:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1877"}],"fixed_packages":[],"aliases":["CVE-2021-26341"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ezb4-x5pv-myhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69194?format=json","vulnerability_id":"VCID-faw1-1y85-47bp","summary":"kernel: RDMA/rxe: Fix error unwind in rxe_create_qp()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50127.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50127.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50127","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06275","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06321","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06361","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06353","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06348","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06298","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06337","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19455","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50127"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373477","reference_id":"2373477","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"}],"fixed_packages":[],"aliases":["CVE-2022-50127"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-faw1-1y85-47bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69289?format=json","vulnerability_id":"VCID-fdfe-gnqt-93gg","summary":"kernel: drm/ttm: Fix dummy res NULL ptr deref bug","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50068.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50068.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50068","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04734","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04751","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50068"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373573","reference_id":"2373573","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50068"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fdfe-gnqt-93gg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66972?format=json","vulnerability_id":"VCID-fnzb-ch6y-t7ev","summary":"kernel: RDMA/rxe: Fix mr->map double free","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50543.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50543.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50543","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01854","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01866","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01884","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0187","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01849","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0183","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01829","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01914","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01908","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01904","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01937","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50543"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402222","reference_id":"2402222","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22800","reference_id":"RHSA-2025:22800","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22800"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22801","reference_id":"RHSA-2025:22801","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22801"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0532","reference_id":"RHSA-2026:0532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0536","reference_id":"RHSA-2026:0536","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0536"}],"fixed_packages":[],"aliases":["CVE-2022-50543"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fnzb-ch6y-t7ev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69314?format=json","vulnerability_id":"VCID-fqxs-pr9b-jqa1","summary":"kernel: ASoc: audio-graph-card2: Fix refcount leak bug in __graph_get_type()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50113.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50113.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50113","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04734","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04751","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50113"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373598","reference_id":"2373598","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50113"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fqxs-pr9b-jqa1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71349?format=json","vulnerability_id":"VCID-g18c-sa3b-aydc","summary":"kernel: drm/amdgpu: Off by one in dm_dmub_outbox1_low_irq()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49365.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49365.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49365","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10785","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21507","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21727","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21784","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21755","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21674","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21526","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21651","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49365"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347917","reference_id":"2347917","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347917"},{"reference_url":"https://git.kernel.org/stable/c/607c5cd1a08e196d9f2bd3b25a8083ed27ad7ceb","reference_id":"607c5cd1a08e196d9f2bd3b25a8083ed27ad7ceb","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:38Z/"}],"url":"https://git.kernel.org/stable/c/607c5cd1a08e196d9f2bd3b25a8083ed27ad7ceb"},{"reference_url":"https://git.kernel.org/stable/c/a35faec3db0e13aac8ea720bc1a3503081dd5a3d","reference_id":"a35faec3db0e13aac8ea720bc1a3503081dd5a3d","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:38Z/"}],"url":"https://git.kernel.org/stable/c/a35faec3db0e13aac8ea720bc1a3503081dd5a3d"},{"reference_url":"https://git.kernel.org/stable/c/b0808b7a04157b3f56e919f27023fec37a075fad","reference_id":"b0808b7a04157b3f56e919f27023fec37a075fad","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:38Z/"}],"url":"https://git.kernel.org/stable/c/b0808b7a04157b3f56e919f27023fec37a075fad"},{"reference_url":"https://git.kernel.org/stable/c/ec9ec3bc08b18c5b1b2feafd306ea7c348013898","reference_id":"ec9ec3bc08b18c5b1b2feafd306ea7c348013898","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:38Z/"}],"url":"https://git.kernel.org/stable/c/ec9ec3bc08b18c5b1b2feafd306ea7c348013898"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49365"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g18c-sa3b-aydc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79008?format=json","vulnerability_id":"VCID-g2k9-eds7-6qe3","summary":"kernel: memory corruption in usbmon driver","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43750.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43750.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43750","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19108","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19101","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19091","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19133","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19187","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21309","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21116","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21406","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21158","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21138","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2114","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151270","reference_id":"2151270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151270"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1987","reference_id":"RHSA-2023:1987","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1987"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1988","reference_id":"RHSA-2023:1988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5791-1/","reference_id":"USN-5791-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-1/"},{"reference_url":"https://usn.ubuntu.com/5791-2/","reference_id":"USN-5791-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-2/"},{"reference_url":"https://usn.ubuntu.com/5791-3/","reference_id":"USN-5791-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-3/"},{"reference_url":"https://usn.ubuntu.com/5792-1/","reference_id":"USN-5792-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5792-1/"},{"reference_url":"https://usn.ubuntu.com/5792-2/","reference_id":"USN-5792-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5792-2/"},{"reference_url":"https://usn.ubuntu.com/5793-1/","reference_id":"USN-5793-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-1/"},{"reference_url":"https://usn.ubuntu.com/5793-2/","reference_id":"USN-5793-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-2/"},{"reference_url":"https://usn.ubuntu.com/5793-3/","reference_id":"USN-5793-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-3/"},{"reference_url":"https://usn.ubuntu.com/5793-4/","reference_id":"USN-5793-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-4/"},{"reference_url":"https://usn.ubuntu.com/5815-1/","reference_id":"USN-5815-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5815-1/"},{"reference_url":"https://usn.ubuntu.com/5854-1/","reference_id":"USN-5854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5854-1/"},{"reference_url":"https://usn.ubuntu.com/5861-1/","reference_id":"USN-5861-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5861-1/"},{"reference_url":"https://usn.ubuntu.com/5862-1/","reference_id":"USN-5862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5862-1/"},{"reference_url":"https://usn.ubuntu.com/5865-1/","reference_id":"USN-5865-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5865-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5913-1/","reference_id":"USN-5913-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5913-1/"},{"reference_url":"https://usn.ubuntu.com/5919-1/","reference_id":"USN-5919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5919-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"}],"fixed_packages":[],"aliases":["CVE-2022-43750"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g2k9-eds7-6qe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79699?format=json","vulnerability_id":"VCID-ge37-2by5-yudu","summary":"kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1679.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1679.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1679","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14011","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14065","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13869","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14006","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13962","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13926","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13783","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13778","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13853","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13878","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13851","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13766","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1679"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084125","reference_id":"2084125","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7933","reference_id":"RHSA-2022:7933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5500-1/","reference_id":"USN-5500-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5500-1/"},{"reference_url":"https://usn.ubuntu.com/5505-1/","reference_id":"USN-5505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5505-1/"},{"reference_url":"https://usn.ubuntu.com/5513-1/","reference_id":"USN-5513-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5513-1/"},{"reference_url":"https://usn.ubuntu.com/5517-1/","reference_id":"USN-5517-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5517-1/"},{"reference_url":"https://usn.ubuntu.com/5529-1/","reference_id":"USN-5529-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5529-1/"},{"reference_url":"https://usn.ubuntu.com/5544-1/","reference_id":"USN-5544-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5544-1/"},{"reference_url":"https://usn.ubuntu.com/5560-1/","reference_id":"USN-5560-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5560-1/"},{"reference_url":"https://usn.ubuntu.com/5560-2/","reference_id":"USN-5560-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5560-2/"},{"reference_url":"https://usn.ubuntu.com/5562-1/","reference_id":"USN-5562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5562-1/"},{"reference_url":"https://usn.ubuntu.com/5564-1/","reference_id":"USN-5564-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5564-1/"},{"reference_url":"https://usn.ubuntu.com/5566-1/","reference_id":"USN-5566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5566-1/"},{"reference_url":"https://usn.ubuntu.com/5582-1/","reference_id":"USN-5582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5582-1/"}],"fixed_packages":[],"aliases":["CVE-2022-1679"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ge37-2by5-yudu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76479?format=json","vulnerability_id":"VCID-guqa-19j6-bba4","summary":"kernel: scsi: mpt3sas: Fix use-after-free warning","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48695.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48695","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04659","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04654","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04636","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04594","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04732","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04769","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04804","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04602","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04609","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278999","reference_id":"2278999","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278999"},{"reference_url":"https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b","reference_id":"41acb064c4e013808bc7d5fc1b506fa449425b0b","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b"},{"reference_url":"https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5","reference_id":"5682c94644fde72f72bded6580c38189ffc856b5","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5"},{"reference_url":"https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7","reference_id":"6229fa494a5949be209bc73afbc5d0a749c2e3c7","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7"},{"reference_url":"https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16","reference_id":"82efb917eeb27454dc4c6fe26432fc8f6c75bc16","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16"},{"reference_url":"https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34","reference_id":"991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34"},{"reference_url":"https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82","reference_id":"b8fc9e91b931215110ba824d1a2983c5f60b6f82","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82"},{"reference_url":"https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6","reference_id":"d4959d09b76eb7a4146f5133962b88d3bddb63d6","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6"},{"reference_url":"https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057","reference_id":"ea10a652ad2ae2cf3eced6f632a5c98f26727057","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9500","reference_id":"RHSA-2024:9500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9500"}],"fixed_packages":[],"aliases":["CVE-2022-48695"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-guqa-19j6-bba4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71744?format=json","vulnerability_id":"VCID-gw57-rwvw-jydt","summary":"kernel: rtw89: cfo: check mac_id to avoid out-of-bounds","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49471.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49471.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49471","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06934","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06884","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20982","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21206","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21152","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21156","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21134","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21008","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21178","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21248","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49471"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/03ed236480aeec8c2fd327a1ea6d711364c495e3","reference_id":"03ed236480aeec8c2fd327a1ea6d711364c495e3","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:39:49Z/"}],"url":"https://git.kernel.org/stable/c/03ed236480aeec8c2fd327a1ea6d711364c495e3"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348322","reference_id":"2348322","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348322"},{"reference_url":"https://git.kernel.org/stable/c/97df85871a5b187609d30fca6d85b912d9e02f29","reference_id":"97df85871a5b187609d30fca6d85b912d9e02f29","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:39:49Z/"}],"url":"https://git.kernel.org/stable/c/97df85871a5b187609d30fca6d85b912d9e02f29"},{"reference_url":"https://git.kernel.org/stable/c/c32fafe68298bb599e825c298e1d0ba30186f0a5","reference_id":"c32fafe68298bb599e825c298e1d0ba30186f0a5","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:39:49Z/"}],"url":"https://git.kernel.org/stable/c/c32fafe68298bb599e825c298e1d0ba30186f0a5"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49471"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gw57-rwvw-jydt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79396?format=json","vulnerability_id":"VCID-h82m-mnhk-67e2","summary":"kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39189.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39189.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39189","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0551","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05325","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05358","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05382","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05338","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05328","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05276","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05277","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05428","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05509","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2124788","reference_id":"2124788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2124788"},{"reference_url":"https://github.com/torvalds/linux/commit/6cd88243c7e03845a450795e134b488fc2afb736","reference_id":"6cd88243c7e03845a450795e134b488fc2afb736","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/"}],"url":"https://github.com/torvalds/linux/commit/6cd88243c7e03845a450795e134b488fc2afb736"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17","reference_id":"ChangeLog-5.18.17","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2309","reference_id":"detail?id=2309","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/"}],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2309"},{"reference_url":"https://www.debian.org/security/2023/dsa-5480","reference_id":"dsa-5480","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/"}],"url":"https://www.debian.org/security/2023/dsa-5480"},{"reference_url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736","reference_id":"?id=6cd88243c7e03845a450795e134b488fc2afb736","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/"}],"url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230214-0007/","reference_id":"ntap-20230214-0007","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230214-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5667-1/","reference_id":"USN-5667-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5667-1/"},{"reference_url":"https://usn.ubuntu.com/5683-1/","reference_id":"USN-5683-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5683-1/"},{"reference_url":"https://usn.ubuntu.com/5703-1/","reference_id":"USN-5703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5703-1/"}],"fixed_packages":[],"aliases":["CVE-2022-39189"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h82m-mnhk-67e2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65324?format=json","vulnerability_id":"VCID-hm6m-9cz8-gqeh","summary":"kernel: Kernel: Denial of Service via memory leak in wifi power saving mode","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50863.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50863.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50863","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06942","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06914","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50863"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426100","reference_id":"2426100","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50863"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hm6m-9cz8-gqeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69201?format=json","vulnerability_id":"VCID-hn2x-k1gc-gyc5","summary":"kernel: ASoC: mt6359: Fix refcount leak bug","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50111.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50111.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50111","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06468","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0651","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06596","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06588","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06579","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20086","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20084","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19964","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50111"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373484","reference_id":"2373484","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373484"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50111"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hn2x-k1gc-gyc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66243?format=json","vulnerability_id":"VCID-hnu1-1pzz-qqe6","summary":"kernel: perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50615.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50615.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50615","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10119","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10098","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10231","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10211","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10199","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10146","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10275","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10305","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10246","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50615"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419866","reference_id":"2419866","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4789","reference_id":"RHSA-2023:4789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4789"}],"fixed_packages":[],"aliases":["CVE-2022-50615"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hnu1-1pzz-qqe6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67772?format=json","vulnerability_id":"VCID-hx3m-yvh9-tbf3","summary":"kernel: scsi: target: iscsi: Fix a race condition between login_work and the login thread","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50350.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50350.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50350","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01007","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01227","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01152","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01141","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01153","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01222","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01226","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01233","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01008","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01016","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01021","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01004","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50350"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50350","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50350"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/1533b8b3058db618409f41554ebe768c2e3acfae","reference_id":"1533b8b3058db618409f41554ebe768c2e3acfae","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:21:59Z/"}],"url":"https://git.kernel.org/stable/c/1533b8b3058db618409f41554ebe768c2e3acfae"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395874","reference_id":"2395874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395874"},{"reference_url":"https://git.kernel.org/stable/c/3ecdca49ca49d4770639d81503c873b6d25887c4","reference_id":"3ecdca49ca49d4770639d81503c873b6d25887c4","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:21:59Z/"}],"url":"https://git.kernel.org/stable/c/3ecdca49ca49d4770639d81503c873b6d25887c4"},{"reference_url":"https://git.kernel.org/stable/c/fec1b2fa62c162d03f5dcd7b03e3c89d3116d49f","reference_id":"fec1b2fa62c162d03f5dcd7b03e3c89d3116d49f","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:21:59Z/"}],"url":"https://git.kernel.org/stable/c/fec1b2fa62c162d03f5dcd7b03e3c89d3116d49f"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50350"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hx3m-yvh9-tbf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69101?format=json","vulnerability_id":"VCID-hxcx-mxhx-tkeu","summary":"kernel: wifi: mac80211: Fix UAF in ieee80211_scan_rx()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49934.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49934.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49934","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06428","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06508","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06505","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06498","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06488","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19776","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19921","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19806","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49934"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373399","reference_id":"2373399","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49934"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hxcx-mxhx-tkeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69253?format=json","vulnerability_id":"VCID-jbbp-qs23-nfd5","summary":"kernel: ASoC: Intel: avs: Fix potential buffer overflow by snprintf()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50052.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50052.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50052","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08254","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08277","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08257","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22927","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2315","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23112","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22935","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22928","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50052"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373537","reference_id":"2373537","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50052"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jbbp-qs23-nfd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78907?format=json","vulnerability_id":"VCID-jefe-c9nd-ufc1","summary":"kernel: USB-accessible buffer overflow in brcmfmac","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3628.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3628","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20742","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2069","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20671","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2055","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20858","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20916","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2063","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20706","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20785","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150960","reference_id":"2150960","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150960"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295","reference_id":"fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-08T14:15:33Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5780-1/","reference_id":"USN-5780-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5780-1/"},{"reference_url":"https://usn.ubuntu.com/5850-1/","reference_id":"USN-5850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5850-1/"},{"reference_url":"https://usn.ubuntu.com/5851-1/","reference_id":"USN-5851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5851-1/"},{"reference_url":"https://usn.ubuntu.com/5853-1/","reference_id":"USN-5853-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5853-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5874-1/","reference_id":"USN-5874-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5874-1/"},{"reference_url":"https://usn.ubuntu.com/5875-1/","reference_id":"USN-5875-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5875-1/"},{"reference_url":"https://usn.ubuntu.com/5876-1/","reference_id":"USN-5876-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5876-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5878-1/","reference_id":"USN-5878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5878-1/"},{"reference_url":"https://usn.ubuntu.com/5879-1/","reference_id":"USN-5879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5879-1/"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5909-1/","reference_id":"USN-5909-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5909-1/"},{"reference_url":"https://usn.ubuntu.com/5918-1/","reference_id":"USN-5918-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5918-1/"},{"reference_url":"https://usn.ubuntu.com/5919-1/","reference_id":"USN-5919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5919-1/"},{"reference_url":"https://usn.ubuntu.com/5920-1/","reference_id":"USN-5920-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5920-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5925-1/","reference_id":"USN-5925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5925-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/5976-1/","reference_id":"USN-5976-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5976-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3628"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jefe-c9nd-ufc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69404?format=json","vulnerability_id":"VCID-jfke-qr4k-8qht","summary":"kernel: firmware_loader: Fix use-after-free during unregister","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49951.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49951.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49951","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08254","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08277","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08257","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22927","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2315","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23112","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22935","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22928","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49951"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373687","reference_id":"2373687","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373687"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49951"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jfke-qr4k-8qht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67126?format=json","vulnerability_id":"VCID-jrua-87tq-zqd5","summary":"kernel: ALSA: usb-audio: Fix potential memory leaks","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50484.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50484.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50484","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02576","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02693","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02724","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50484"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401488","reference_id":"2401488","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50484"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jrua-87tq-zqd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78948?format=json","vulnerability_id":"VCID-jsr8-pv5g-kba8","summary":"kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41674.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41674.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-41674","reference_id":"","reference_type":"","scores":[{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64641","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64621","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64653","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.6465","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66396","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66392","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66422","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66486","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66468","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66432","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66463","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66475","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66455","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66441","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-41674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/10/13/2","reference_id":"2","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/10/13/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134377","reference_id":"2134377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134377"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/10/13/5","reference_id":"5","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/10/13/5"},{"reference_url":"https://security.archlinux.org/ASA-202210-1","reference_id":"ASA-202210-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-1"},{"reference_url":"https://security.archlinux.org/ASA-202210-2","reference_id":"ASA-202210-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-2"},{"reference_url":"https://security.archlinux.org/ASA-202210-3","reference_id":"ASA-202210-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-3"},{"reference_url":"https://security.archlinux.org/ASA-202210-4","reference_id":"ASA-202210-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-4"},{"reference_url":"https://security.archlinux.org/AVG-2800","reference_id":"AVG-2800","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2800"},{"reference_url":"https://security.archlinux.org/AVG-2801","reference_id":"AVG-2801","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2801"},{"reference_url":"https://security.archlinux.org/AVG-2802","reference_id":"AVG-2802","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2802"},{"reference_url":"https://security.archlinux.org/AVG-2803","reference_id":"AVG-2803","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2803"},{"reference_url":"https://www.debian.org/security/2022/dsa-5257","reference_id":"dsa-5257","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://www.debian.org/security/2022/dsa-5257"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/","reference_id":"GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d","reference_id":"?id=aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d"},{"reference_url":"http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0090-1.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html","reference_id":"msg00001.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/","reference_id":"S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/net/mac80211/scan.c","reference_id":"scan.c","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/net/mac80211/scan.c"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1203770","reference_id":"show_bug.cgi?id=1203770","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1203770"},{"reference_url":"https://usn.ubuntu.com/5691-1/","reference_id":"USN-5691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5691-1/"},{"reference_url":"https://usn.ubuntu.com/5692-1/","reference_id":"USN-5692-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5692-1/"},{"reference_url":"https://usn.ubuntu.com/5693-1/","reference_id":"USN-5693-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5693-1/"},{"reference_url":"https://usn.ubuntu.com/5700-1/","reference_id":"USN-5700-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5700-1/"},{"reference_url":"https://usn.ubuntu.com/5708-1/","reference_id":"USN-5708-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5708-1/"},{"reference_url":"https://usn.ubuntu.com/5752-1/","reference_id":"USN-5752-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5752-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/","reference_id":"VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/"}],"fixed_packages":[],"aliases":["CVE-2022-41674"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jsr8-pv5g-kba8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74253?format=json","vulnerability_id":"VCID-jx87-wg73-ukch","summary":"kernel: net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48883.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48883.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48883","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02984","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03097","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03069","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03063","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03053","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03006","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03031","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02994","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0297","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02961","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02936","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02947","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48883"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2306404","reference_id":"2306404","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2306404"},{"reference_url":"https://git.kernel.org/stable/c/31c70bfe58ef09fe36327ddcced9143a16e9e83d","reference_id":"31c70bfe58ef09fe36327ddcced9143a16e9e83d","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:04:49Z/"}],"url":"https://git.kernel.org/stable/c/31c70bfe58ef09fe36327ddcced9143a16e9e83d"},{"reference_url":"https://git.kernel.org/stable/c/5844a46f09f768da866d6b0ffbf1a9073266bf24","reference_id":"5844a46f09f768da866d6b0ffbf1a9073266bf24","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:04:49Z/"}],"url":"https://git.kernel.org/stable/c/5844a46f09f768da866d6b0ffbf1a9073266bf24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-48883"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jx87-wg73-ukch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67875?format=json","vulnerability_id":"VCID-k4nc-2pq1-yfgy","summary":"kernel: Linux kernel: Denial of Service due to memory allocation failure in vhost/vsock","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50271.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50271.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50271","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04067","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50271"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50271"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395311","reference_id":"2395311","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395311"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50271"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k4nc-2pq1-yfgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71144?format=json","vulnerability_id":"VCID-krx6-hxs8-63cg","summary":"kernel: vlan: fix memory leak in vlan_newlink()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49636.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49636.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49636","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16584","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16647","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16447","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16568","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16528","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16411","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16431","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16468","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28736","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.2892","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28808","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49636"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347709","reference_id":"2347709","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347709"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://usn.ubuntu.com/7585-1/","reference_id":"USN-7585-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-1/"},{"reference_url":"https://usn.ubuntu.com/7585-2/","reference_id":"USN-7585-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-2/"},{"reference_url":"https://usn.ubuntu.com/7585-3/","reference_id":"USN-7585-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-3/"},{"reference_url":"https://usn.ubuntu.com/7585-4/","reference_id":"USN-7585-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-4/"},{"reference_url":"https://usn.ubuntu.com/7585-5/","reference_id":"USN-7585-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-5/"},{"reference_url":"https://usn.ubuntu.com/7585-6/","reference_id":"USN-7585-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-6/"},{"reference_url":"https://usn.ubuntu.com/7585-7/","reference_id":"USN-7585-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7585-7/"},{"reference_url":"https://usn.ubuntu.com/7591-1/","reference_id":"USN-7591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-1/"},{"reference_url":"https://usn.ubuntu.com/7591-2/","reference_id":"USN-7591-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-2/"},{"reference_url":"https://usn.ubuntu.com/7591-3/","reference_id":"USN-7591-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-3/"},{"reference_url":"https://usn.ubuntu.com/7591-4/","reference_id":"USN-7591-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-4/"},{"reference_url":"https://usn.ubuntu.com/7591-5/","reference_id":"USN-7591-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-5/"},{"reference_url":"https://usn.ubuntu.com/7591-6/","reference_id":"USN-7591-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7591-6/"},{"reference_url":"https://usn.ubuntu.com/7592-1/","reference_id":"USN-7592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7592-1/"},{"reference_url":"https://usn.ubuntu.com/7593-1/","reference_id":"USN-7593-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7593-1/"},{"reference_url":"https://usn.ubuntu.com/7597-1/","reference_id":"USN-7597-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7597-1/"},{"reference_url":"https://usn.ubuntu.com/7597-2/","reference_id":"USN-7597-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7597-2/"},{"reference_url":"https://usn.ubuntu.com/7598-1/","reference_id":"USN-7598-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7598-1/"},{"reference_url":"https://usn.ubuntu.com/7602-1/","reference_id":"USN-7602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7602-1/"},{"reference_url":"https://usn.ubuntu.com/7655-1/","reference_id":"USN-7655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7655-1/"}],"fixed_packages":[],"aliases":["CVE-2022-49636"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-krx6-hxs8-63cg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71184?format=json","vulnerability_id":"VCID-ktvg-r7bg-h3hh","summary":"kernel: drm/i915/reset: Fix error_state_read ptr + offset use","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49723.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49723.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49723","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10785","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21784","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21755","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21674","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21526","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21507","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21651","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21727","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347749","reference_id":"2347749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49723"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ktvg-r7bg-h3hh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69861?format=json","vulnerability_id":"VCID-kz59-zv57-zbb7","summary":"kernel: iavf: fix hang on reboot with ice","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53064.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53064.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53064","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20248","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20306","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2003","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20193","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2009","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20086","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20084","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19964","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19934","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53064"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363754","reference_id":"2363754","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2023-53064"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kz59-zv57-zbb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78998?format=json","vulnerability_id":"VCID-m26e-r8mc-jbbq","summary":"kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2196.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2196.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2196","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09601","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09629","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09677","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09644","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12358","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12452","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12259","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12258","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12496","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12301","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1238","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12398","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160023","reference_id":"2160023","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160023"},{"reference_url":"https://kernel.dance/#2e7eab81425a","reference_id":"#2e7eab81425a","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/"}],"url":"https://kernel.dance/#2e7eab81425a"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5","reference_id":"?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://usn.ubuntu.com/5970-1/","reference_id":"USN-5970-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5970-1/"},{"reference_url":"https://usn.ubuntu.com/5976-1/","reference_id":"USN-5976-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5976-1/"},{"reference_url":"https://usn.ubuntu.com/5977-1/","reference_id":"USN-5977-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5977-1/"},{"reference_url":"https://usn.ubuntu.com/5978-1/","reference_id":"USN-5978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5978-1/"},{"reference_url":"https://usn.ubuntu.com/5979-1/","reference_id":"USN-5979-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5979-1/"},{"reference_url":"https://usn.ubuntu.com/5980-1/","reference_id":"USN-5980-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5980-1/"},{"reference_url":"https://usn.ubuntu.com/5982-1/","reference_id":"USN-5982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5982-1/"},{"reference_url":"https://usn.ubuntu.com/5985-1/","reference_id":"USN-5985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5985-1/"},{"reference_url":"https://usn.ubuntu.com/5987-1/","reference_id":"USN-5987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5987-1/"},{"reference_url":"https://usn.ubuntu.com/6004-1/","reference_id":"USN-6004-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6004-1/"},{"reference_url":"https://usn.ubuntu.com/6020-1/","reference_id":"USN-6020-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6020-1/"},{"reference_url":"https://usn.ubuntu.com/6151-1/","reference_id":"USN-6151-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6151-1/"}],"fixed_packages":[],"aliases":["CVE-2022-2196"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m26e-r8mc-jbbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69330?format=json","vulnerability_id":"VCID-m4qz-eg1v-k7h7","summary":"kernel: drm/i915: fix null pointer dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49960.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49960.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49960","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07701","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07764","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49960"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373614","reference_id":"2373614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49960"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m4qz-eg1v-k7h7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78639?format=json","vulnerability_id":"VCID-m4wy-164p-qyh7","summary":"kernel: net/ulp: use-after-free in listening ULP sockets","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0461.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0461.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0461","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32927","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32963","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32832","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32862","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32823","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32798","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32841","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32818","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34683","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.3445","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34431","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34345","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0461"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176192","reference_id":"2176192","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176192"},{"reference_url":"https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c","reference_id":"#2c02d41d71f90a5168391b6a5f2954112ba2307c","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/"}],"url":"https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c","reference_id":"?id=2c02d41d71f90a5168391b6a5f2954112ba2307c","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1556","reference_id":"RHSA-2023:1556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1557","reference_id":"RHSA-2023:1557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1662","reference_id":"RHSA-2023:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1841","reference_id":"RHSA-2023:1841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1923","reference_id":"RHSA-2023:1923","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1923"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3190","reference_id":"RHSA-2023:3190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3191","reference_id":"RHSA-2023:3191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3465","reference_id":"RHSA-2023:3465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3470","reference_id":"RHSA-2023:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3490","reference_id":"RHSA-2023:3490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3491","reference_id":"RHSA-2023:3491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4125","reference_id":"RHSA-2023:4125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4126","reference_id":"RHSA-2023:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4146","reference_id":"RHSA-2023:4146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4146"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5911-1/","reference_id":"USN-5911-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5911-1/"},{"reference_url":"https://usn.ubuntu.com/5912-1/","reference_id":"USN-5912-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5912-1/"},{"reference_url":"https://usn.ubuntu.com/5913-1/","reference_id":"USN-5913-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5913-1/"},{"reference_url":"https://usn.ubuntu.com/5914-1/","reference_id":"USN-5914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5914-1/"},{"reference_url":"https://usn.ubuntu.com/5915-1/","reference_id":"USN-5915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5915-1/"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5919-1/","reference_id":"USN-5919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5919-1/"},{"reference_url":"https://usn.ubuntu.com/5920-1/","reference_id":"USN-5920-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5920-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5925-1/","reference_id":"USN-5925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5925-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5929-1/","reference_id":"USN-5929-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5929-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5935-1/","reference_id":"USN-5935-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5935-1/"},{"reference_url":"https://usn.ubuntu.com/5938-1/","reference_id":"USN-5938-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5938-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5941-1/","reference_id":"USN-5941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5941-1/"},{"reference_url":"https://usn.ubuntu.com/5950-1/","reference_id":"USN-5950-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5950-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/5962-1/","reference_id":"USN-5962-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5962-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/5976-1/","reference_id":"USN-5976-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5976-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"}],"fixed_packages":[],"aliases":["CVE-2023-0461"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m4wy-164p-qyh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69311?format=json","vulnerability_id":"VCID-mhg4-ckg3-t3ds","summary":"kernel: drm/amdgpu: Fix use-after-free on amdgpu_bo_list mutex","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50035.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50035.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50035","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08254","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08277","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08257","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22927","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2315","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23112","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22935","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22928","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50035"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373595","reference_id":"2373595","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373595"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50035"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mhg4-ckg3-t3ds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78631?format=json","vulnerability_id":"VCID-mrhs-1bmb-3bc5","summary":"kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22998.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22998.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22998","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05279","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05243","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05252","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05184","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05188","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05926","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05935","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0589","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05859","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22998"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182429","reference_id":"2182429","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182429"},{"reference_url":"https://github.com/torvalds/linux/commit/c24968734abfed81c8f93dc5f44a7b7a9aecadfa","reference_id":"c24968734abfed81c8f93dc5f44a7b7a9aecadfa","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:03Z/"}],"url":"https://github.com/torvalds/linux/commit/c24968734abfed81c8f93dc5f44a7b7a9aecadfa"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.3","reference_id":"ChangeLog-6.0.3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:03Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.3"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2023-22998"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mrhs-1bmb-3bc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67317?format=json","vulnerability_id":"VCID-msyn-9j58-2ub9","summary":"kernel: ALSA: ac97: fix possible memory leak in snd_ac97_dev_register()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50427.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50427","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400751","reference_id":"2400751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400751"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50427"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-msyn-9j58-2ub9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69131?format=json","vulnerability_id":"VCID-n169-32k2-7qe8","summary":"kernel: drm/amd/display: Check correct bounds for stream encoder instances for DCN303","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50079.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50079.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50079","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05137","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05159","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05192","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05181","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05164","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16018","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16114","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16132","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16059","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16057","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50079"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373425","reference_id":"2373425","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373425"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50079"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n169-32k2-7qe8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79087?format=json","vulnerability_id":"VCID-n2c4-w748-tyau","summary":"kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3623.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3623.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3623","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22863","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2319","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23234","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23023","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23096","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23149","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2313","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23073","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23088","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23079","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23042","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22866","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165721","reference_id":"2165721","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165721"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://www.debian.org/security/2023/dsa-5324","reference_id":"dsa-5324","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/"}],"url":"https://www.debian.org/security/2023/dsa-5324"},{"reference_url":"https://vuldb.com/?id.211921","reference_id":"?id.211921","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/"}],"url":"https://vuldb.com/?id.211921"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f","reference_id":"?id=fac35ba763ed07ba93154c95ffc0c4a55023707f","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5793-1/","reference_id":"USN-5793-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-1/"},{"reference_url":"https://usn.ubuntu.com/5793-2/","reference_id":"USN-5793-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-2/"},{"reference_url":"https://usn.ubuntu.com/5793-3/","reference_id":"USN-5793-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-3/"},{"reference_url":"https://usn.ubuntu.com/5793-4/","reference_id":"USN-5793-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-4/"},{"reference_url":"https://usn.ubuntu.com/5851-1/","reference_id":"USN-5851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5851-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5876-1/","reference_id":"USN-5876-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5876-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3623"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n2c4-w748-tyau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79149?format=json","vulnerability_id":"VCID-nck8-brgn-hkdx","summary":"kernel: use-after-free after failed devlink reload in devlink_param_get","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3625.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3625","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05917","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05836","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05869","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05906","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06089","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06169","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06159","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06154","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06107","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06118","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0613","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06106","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2144720","reference_id":"2144720","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2144720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://usn.ubuntu.com/5728-1/","reference_id":"USN-5728-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-1/"},{"reference_url":"https://usn.ubuntu.com/5728-2/","reference_id":"USN-5728-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-2/"},{"reference_url":"https://usn.ubuntu.com/5728-3/","reference_id":"USN-5728-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-3/"},{"reference_url":"https://usn.ubuntu.com/5729-1/","reference_id":"USN-5729-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5729-1/"},{"reference_url":"https://usn.ubuntu.com/5729-2/","reference_id":"USN-5729-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5729-2/"}],"fixed_packages":[],"aliases":["CVE-2022-3625"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nck8-brgn-hkdx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69299?format=json","vulnerability_id":"VCID-nek7-8svy-tfc8","summary":"kernel: drm/amd/pm: add missing ->fini_xxxx interfaces for some SMU13 asics","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49965.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49965.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49965","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07701","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07764","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49965"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373583","reference_id":"2373583","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49965"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nek7-8svy-tfc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78778?format=json","vulnerability_id":"VCID-ng25-c2xk-9fem","summary":"kernel: NULL pointer dereference in traffic control subsystem","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47929.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47929.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47929","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08654","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08685","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08699","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08652","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09472","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0942","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09525","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09541","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0957","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09556","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09508","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09521","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09419","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168246","reference_id":"2168246","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168246"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6","reference_id":"ChangeLog-6.1.6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6"},{"reference_url":"https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html","reference_id":"components.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/"}],"url":"https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html"},{"reference_url":"https://www.debian.org/security/2023/dsa-5324","reference_id":"dsa-5324","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/"}],"url":"https://www.debian.org/security/2023/dsa-5324"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407","reference_id":"?id=96398560f26aa07e8f2969d73c8197e6a6d10407","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://www.spinics.net/lists/netdev/msg555705.html","reference_id":"msg555705.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/"}],"url":"https://www.spinics.net/lists/netdev/msg555705.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5915-1/","reference_id":"USN-5915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5915-1/"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/5981-1/","reference_id":"USN-5981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5981-1/"},{"reference_url":"https://usn.ubuntu.com/5984-1/","reference_id":"USN-5984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5984-1/"},{"reference_url":"https://usn.ubuntu.com/5991-1/","reference_id":"USN-5991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5991-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6009-1/","reference_id":"USN-6009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6009-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6024-1/","reference_id":"USN-6024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6024-1/"},{"reference_url":"https://usn.ubuntu.com/6025-1/","reference_id":"USN-6025-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6025-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6040-1/","reference_id":"USN-6040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6040-1/"},{"reference_url":"https://usn.ubuntu.com/6057-1/","reference_id":"USN-6057-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6057-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6247-1/","reference_id":"USN-6247-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6247-1/"},{"reference_url":"https://usn.ubuntu.com/6248-1/","reference_id":"USN-6248-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6248-1/"}],"fixed_packages":[],"aliases":["CVE-2022-47929"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ng25-c2xk-9fem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71680?format=json","vulnerability_id":"VCID-nge8-nz3d-vkb9","summary":"kernel: udp: Fix a data-race around sysctl_udp_l3mdev_accept.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49577.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49577.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49577","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07626","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07669","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19487","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19707","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19762","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19713","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19656","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19632","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19634","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19648","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19539","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19526","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49577"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348255","reference_id":"2348255","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348255"},{"reference_url":"https://git.kernel.org/stable/c/3d72bb4188c708bb16758c60822fc4dda7a95174","reference_id":"3d72bb4188c708bb16758c60822fc4dda7a95174","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:36:27Z/"}],"url":"https://git.kernel.org/stable/c/3d72bb4188c708bb16758c60822fc4dda7a95174"},{"reference_url":"https://git.kernel.org/stable/c/3f2ac2d6511bb0652abf4d7388d65bb9ff1c641c","reference_id":"3f2ac2d6511bb0652abf4d7388d65bb9ff1c641c","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:36:27Z/"}],"url":"https://git.kernel.org/stable/c/3f2ac2d6511bb0652abf4d7388d65bb9ff1c641c"},{"reference_url":"https://git.kernel.org/stable/c/cb0d28934ca10f99c47e2c6f451405d6c954fe48","reference_id":"cb0d28934ca10f99c47e2c6f451405d6c954fe48","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:36:27Z/"}],"url":"https://git.kernel.org/stable/c/cb0d28934ca10f99c47e2c6f451405d6c954fe48"},{"reference_url":"https://git.kernel.org/stable/c/f39b03bd727a8fea62e82f10fe2e0d753b9930ff","reference_id":"f39b03bd727a8fea62e82f10fe2e0d753b9930ff","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:36:27Z/"}],"url":"https://git.kernel.org/stable/c/f39b03bd727a8fea62e82f10fe2e0d753b9930ff"},{"reference_url":"https://git.kernel.org/stable/c/fcaef69c79ec222e55643e666b80b221e70fa6a8","reference_id":"fcaef69c79ec222e55643e666b80b221e70fa6a8","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:36:27Z/"}],"url":"https://git.kernel.org/stable/c/fcaef69c79ec222e55643e666b80b221e70fa6a8"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49577"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nge8-nz3d-vkb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69229?format=json","vulnerability_id":"VCID-ngyy-vztm-97ag","summary":"kernel: RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50138.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50138.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50138","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06223","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06263","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06244","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06289","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0633","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06317","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06305","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19324","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19363","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50138"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373512","reference_id":"2373512","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50138"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ngyy-vztm-97ag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67985?format=json","vulnerability_id":"VCID-nsv2-4qub-93dd","summary":"kernel: sctp: handle the error returned from sctp_auth_asoc_init_active_key","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50243.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50243.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50243","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04164","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0429","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04303","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04323","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04358","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04225","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04156","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50243","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50243"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395428","reference_id":"2395428","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7398","reference_id":"RHSA-2023:7398","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7398"}],"fixed_packages":[],"aliases":["CVE-2022-50243"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nsv2-4qub-93dd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67806?format=json","vulnerability_id":"VCID-nukc-v8yh-wqdc","summary":"kernel: perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50318.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50318.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50318","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04067","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04031","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395235","reference_id":"2395235","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4789","reference_id":"RHSA-2023:4789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"}],"fixed_packages":[],"aliases":["CVE-2022-50318"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nukc-v8yh-wqdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79447?format=json","vulnerability_id":"VCID-p1a3-k51z-byc7","summary":"kernel: possible race condition in drivers/tty/tty_buffers.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1462.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1462.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1462","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12553","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12657","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12699","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12511","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12641","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12608","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12568","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12433","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12437","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12552","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1256","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12526","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12412","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078466","reference_id":"2078466","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078466"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"}],"fixed_packages":[],"aliases":["CVE-2022-1462"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p1a3-k51z-byc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71713?format=json","vulnerability_id":"VCID-pdxe-wqnn-s3gb","summary":"kernel: ALSA: usb-audio: Cancel pending work at closing a MIDI substream","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49545.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49545.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49545","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16446","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16383","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21243","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25756","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25827","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25878","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2589","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25848","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25794","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25749","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28172","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2806","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49545"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348289","reference_id":"2348289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49545"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pdxe-wqnn-s3gb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78952?format=json","vulnerability_id":"VCID-pf6k-jwex-8kay","summary":"kernel: Denial of service in beacon protection for P2P-device","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42722.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42722.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42722","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23135","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23367","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23361","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23341","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2315","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23143","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23477","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23514","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23298","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23422","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23441","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23403","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23349","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134517","reference_id":"2134517","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134517"},{"reference_url":"https://security.archlinux.org/ASA-202210-1","reference_id":"ASA-202210-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-1"},{"reference_url":"https://security.archlinux.org/ASA-202210-2","reference_id":"ASA-202210-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-2"},{"reference_url":"https://security.archlinux.org/ASA-202210-3","reference_id":"ASA-202210-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-3"},{"reference_url":"https://security.archlinux.org/ASA-202210-4","reference_id":"ASA-202210-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-4"},{"reference_url":"https://security.archlinux.org/AVG-2800","reference_id":"AVG-2800","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2800"},{"reference_url":"https://security.archlinux.org/AVG-2801","reference_id":"AVG-2801","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2801"},{"reference_url":"https://security.archlinux.org/AVG-2802","reference_id":"AVG-2802","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2802"},{"reference_url":"https://security.archlinux.org/AVG-2803","reference_id":"AVG-2803","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2803"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://usn.ubuntu.com/5692-1/","reference_id":"USN-5692-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5692-1/"},{"reference_url":"https://usn.ubuntu.com/5693-1/","reference_id":"USN-5693-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5693-1/"},{"reference_url":"https://usn.ubuntu.com/5700-1/","reference_id":"USN-5700-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5700-1/"},{"reference_url":"https://usn.ubuntu.com/5708-1/","reference_id":"USN-5708-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5708-1/"},{"reference_url":"https://usn.ubuntu.com/5752-1/","reference_id":"USN-5752-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5752-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42722"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pf6k-jwex-8kay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78975?format=json","vulnerability_id":"VCID-pphs-rtxe-wfca","summary":"kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3564.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3564.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3564","reference_id":"","reference_type":"","scores":[{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25076","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25207","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25217","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25178","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25131","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2512","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25174","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25243","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25288","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25302","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2526","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150999","reference_id":"2150999","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150999"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0856","reference_id":"RHSA-2023:0856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0856"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0858","reference_id":"RHSA-2023:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0951","reference_id":"RHSA-2023:0951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0979","reference_id":"RHSA-2023:0979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1008","reference_id":"RHSA-2023:1008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1202","reference_id":"RHSA-2023:1202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1203","reference_id":"RHSA-2023:1203","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1220","reference_id":"RHSA-2023:1220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1221","reference_id":"RHSA-2023:1221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1251","reference_id":"RHSA-2023:1251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1251"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1435","reference_id":"RHSA-2023:1435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1559","reference_id":"RHSA-2023:1559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1560","reference_id":"RHSA-2023:1560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1666","reference_id":"RHSA-2023:1666","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3277","reference_id":"RHSA-2023:3277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3278","reference_id":"RHSA-2023:3278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3388","reference_id":"RHSA-2023:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3431","reference_id":"RHSA-2023:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3491","reference_id":"RHSA-2023:3491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4020","reference_id":"RHSA-2023:4020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4021","reference_id":"RHSA-2023:4021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4150","reference_id":"RHSA-2023:4150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4150"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4151","reference_id":"RHSA-2023:4151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4215","reference_id":"RHSA-2023:4215","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4215"},{"reference_url":"https://usn.ubuntu.com/5754-1/","reference_id":"USN-5754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-1/"},{"reference_url":"https://usn.ubuntu.com/5754-2/","reference_id":"USN-5754-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-2/"},{"reference_url":"https://usn.ubuntu.com/5755-1/","reference_id":"USN-5755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-1/"},{"reference_url":"https://usn.ubuntu.com/5755-2/","reference_id":"USN-5755-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-2/"},{"reference_url":"https://usn.ubuntu.com/5756-1/","reference_id":"USN-5756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-1/"},{"reference_url":"https://usn.ubuntu.com/5756-2/","reference_id":"USN-5756-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-2/"},{"reference_url":"https://usn.ubuntu.com/5756-3/","reference_id":"USN-5756-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-3/"},{"reference_url":"https://usn.ubuntu.com/5757-1/","reference_id":"USN-5757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-1/"},{"reference_url":"https://usn.ubuntu.com/5757-2/","reference_id":"USN-5757-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-2/"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5773-1/","reference_id":"USN-5773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5773-1/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"},{"reference_url":"https://usn.ubuntu.com/5779-1/","reference_id":"USN-5779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5779-1/"},{"reference_url":"https://usn.ubuntu.com/5789-1/","reference_id":"USN-5789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5789-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3564"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pphs-rtxe-wfca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79179?format=json","vulnerability_id":"VCID-pq7v-b14b-tuhv","summary":"Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2177.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2177.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2177","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01464","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01443","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01451","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01466","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01472","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01479","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01468","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01456","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01471","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01463","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2177"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187953","reference_id":"2187953","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187953"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0","reference_id":"?id=181d8d2066c0","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:09Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7398","reference_id":"RHSA-2023:7398","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7398"}],"fixed_packages":[],"aliases":["CVE-2023-2177"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pq7v-b14b-tuhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69178?format=json","vulnerability_id":"VCID-ptv6-28rx-nfg1","summary":"kernel: ALSA: bcd2000: Fix a UAF bug on the error path of probing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50229.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50229.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50229","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06044","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06089","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06113","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06151","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06142","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06138","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06131","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18837","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18984","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18996","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19004","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18896","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18879","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50229"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373460","reference_id":"2373460","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17109","reference_id":"RHSA-2025:17109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17161","reference_id":"RHSA-2025:17161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18043","reference_id":"RHSA-2025:18043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21667","reference_id":"RHSA-2025:21667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"}],"fixed_packages":[],"aliases":["CVE-2022-50229"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ptv6-28rx-nfg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71554?format=json","vulnerability_id":"VCID-pymq-pcau-s3cv","summary":"kernel: cpufreq: governor: Use kobject release() method to free dbs_data","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49513.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49513.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49513","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08329","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08382","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21784","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21651","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21727","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21526","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21755","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21674","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23499","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49513"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348128","reference_id":"2348128","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49513"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pymq-pcau-s3cv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78965?format=json","vulnerability_id":"VCID-pyph-7y9k-gkfa","summary":"kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3707.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3707.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3707","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02548","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02528","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02518","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02516","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02502","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02507","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02614","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02599","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02587","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02521","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02527","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/","reference_id":"20221007013708.1946061-1-zyytlz.wz%40163.com","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/"}],"url":"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2137979","reference_id":"2137979","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2137979"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5915-1/","reference_id":"USN-5915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5915-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6080-1/","reference_id":"USN-6080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6080-1/"},{"reference_url":"https://usn.ubuntu.com/6085-1/","reference_id":"USN-6085-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6085-1/"},{"reference_url":"https://usn.ubuntu.com/6090-1/","reference_id":"USN-6090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6090-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6094-1/","reference_id":"USN-6094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6094-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6109-1/","reference_id":"USN-6109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6109-1/"},{"reference_url":"https://usn.ubuntu.com/6118-1/","reference_id":"USN-6118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6118-1/"},{"reference_url":"https://usn.ubuntu.com/6132-1/","reference_id":"USN-6132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6132-1/"},{"reference_url":"https://usn.ubuntu.com/6133-1/","reference_id":"USN-6133-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6133-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3707"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pyph-7y9k-gkfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79154?format=json","vulnerability_id":"VCID-q5kt-n8qx-57dd","summary":"kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1095.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1095.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1095","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03721","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03852","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03661","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03673","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03794","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03799","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03802","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03746","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0375","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03733","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03711","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03685","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173973","reference_id":"2173973","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T17:30:41Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173973"},{"reference_url":"https://github.com/torvalds/linux/commit/580077855a40741cf511766129702d97ff02f4d9","reference_id":"580077855a40741cf511766129702d97ff02f4d9","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T17:30:41Z/"}],"url":"https://github.com/torvalds/linux/commit/580077855a40741cf511766129702d97ff02f4d9"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7933","reference_id":"RHSA-2022:7933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5627","reference_id":"RHSA-2023:5627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5628","reference_id":"RHSA-2023:5628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6813","reference_id":"RHSA-2023:6813","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6813"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6031-1/","reference_id":"USN-6031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6031-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1095"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q5kt-n8qx-57dd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66167?format=json","vulnerability_id":"VCID-qd7g-ymh4-xfd1","summary":"kernel: wifi: brcmfmac: fix invalid address access when enabling SCAN log level","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50678.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50678.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50678","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14454","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14487","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14549","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14383","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14384","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50678"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420341","reference_id":"2420341","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50678"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qd7g-ymh4-xfd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69106?format=json","vulnerability_id":"VCID-qk9e-n69y-zkdz","summary":"kernel: dma-buf/dma-resv: check if the new fence is really later","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49935.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49935.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49935","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08254","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08277","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08257","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22927","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2315","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23112","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22935","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22928","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49935"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49935","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49935"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373404","reference_id":"2373404","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49935"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qk9e-n69y-zkdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78732?format=json","vulnerability_id":"VCID-qkam-j6uv-n7fj","summary":"kernel: NULL pointer dereference in rawv6_push_pending_frames","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0394.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0394.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0394","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06335","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06362","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0687","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06827","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06852","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06869","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06934","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06941","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06942","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06912","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06857","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162120","reference_id":"2162120","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162120"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17","reference_id":"?id=cb3e9864cdbe35ff6378966660edbcbac955fe17","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230302-0005/","reference_id":"ntap-20230302-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230302-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/5976-1/","reference_id":"USN-5976-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5976-1/"},{"reference_url":"https://usn.ubuntu.com/5978-1/","reference_id":"USN-5978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5978-1/"},{"reference_url":"https://usn.ubuntu.com/5981-1/","reference_id":"USN-5981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5981-1/"},{"reference_url":"https://usn.ubuntu.com/5984-1/","reference_id":"USN-5984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5984-1/"},{"reference_url":"https://usn.ubuntu.com/5991-1/","reference_id":"USN-5991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5991-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6009-1/","reference_id":"USN-6009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6009-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6025-1/","reference_id":"USN-6025-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6025-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6040-1/","reference_id":"USN-6040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6040-1/"},{"reference_url":"https://usn.ubuntu.com/6057-1/","reference_id":"USN-6057-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6057-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"}],"fixed_packages":[],"aliases":["CVE-2023-0394"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qkam-j6uv-n7fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67152?format=json","vulnerability_id":"VCID-qpq9-r7ew-qbg3","summary":"kernel: drm/i915: mark requests for GuC virtual engines to avoid use-after-free","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53552.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53552.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53552","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01937","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01936","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0195","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01935","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01919","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01914","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01895","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01893","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01981","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01967","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01964","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01993","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53552"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401514","reference_id":"2401514","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0759","reference_id":"RHSA-2026:0759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0760","reference_id":"RHSA-2026:0760","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0760"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1441","reference_id":"RHSA-2026:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1443","reference_id":"RHSA-2026:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1445","reference_id":"RHSA-2026:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1445"}],"fixed_packages":[],"aliases":["CVE-2023-53552"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qpq9-r7ew-qbg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67608?format=json","vulnerability_id":"VCID-qqwr-5mbd-87ds","summary":"kernel: NFSD: Protect against send buffer overflow in NFSv2 READ","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50410.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50410.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50410","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02561","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02575","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02578","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02584","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02604","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02587","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02574","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05009","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05048","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0505","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04977","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04833","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04824","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50410"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/1868332032eccbab8c1878a0d918193058c0a905","reference_id":"1868332032eccbab8c1878a0d918193058c0a905","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:08:41Z/"}],"url":"https://git.kernel.org/stable/c/1868332032eccbab8c1878a0d918193058c0a905"},{"reference_url":"https://git.kernel.org/stable/c/2007867c5874134f2271eb276398208070049dd3","reference_id":"2007867c5874134f2271eb276398208070049dd3","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:08:41Z/"}],"url":"https://git.kernel.org/stable/c/2007867c5874134f2271eb276398208070049dd3"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396536","reference_id":"2396536","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396536"},{"reference_url":"https://git.kernel.org/stable/c/2be9331ca6061bc6ea32247266f45b8b21030244","reference_id":"2be9331ca6061bc6ea32247266f45b8b21030244","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:08:41Z/"}],"url":"https://git.kernel.org/stable/c/2be9331ca6061bc6ea32247266f45b8b21030244"},{"reference_url":"https://git.kernel.org/stable/c/401bc1f90874280a80b93f23be33a0e7e2d1f912","reference_id":"401bc1f90874280a80b93f23be33a0e7e2d1f912","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:08:41Z/"}],"url":"https://git.kernel.org/stable/c/401bc1f90874280a80b93f23be33a0e7e2d1f912"},{"reference_url":"https://git.kernel.org/stable/c/ea4c3eee0fd72fcedaa238556044825639cd3607","reference_id":"ea4c3eee0fd72fcedaa238556044825639cd3607","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:08:41Z/"}],"url":"https://git.kernel.org/stable/c/ea4c3eee0fd72fcedaa238556044825639cd3607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0832","reference_id":"RHSA-2023:0832","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0832"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22006","reference_id":"RHSA-2025:22006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23445","reference_id":"RHSA-2025:23445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23947","reference_id":"RHSA-2025:23947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23960","reference_id":"RHSA-2025:23960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23960"}],"fixed_packages":[],"aliases":["CVE-2022-50410"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qqwr-5mbd-87ds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79027?format=json","vulnerability_id":"VCID-qrf7-hb33-tqe4","summary":"kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4662.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4662.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4662","reference_id":"","reference_type":"","scores":[{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00314","published_at":"2026-04-02T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00366","published_at":"2026-04-29T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00295","published_at":"2026-04-16T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00298","published_at":"2026-04-18T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00318","published_at":"2026-04-21T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00369","published_at":"2026-04-24T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.0037","published_at":"2026-04-26T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00313","published_at":"2026-04-04T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00304","published_at":"2026-04-07T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00302","published_at":"2026-04-08T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00301","published_at":"2026-04-11T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.003","published_at":"2026-04-12T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00299","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4662"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/all/20220913140355.910732567%40linuxfoundation.org/","reference_id":"20220913140355.910732567%40linuxfoundation.org","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T18:03:46Z/"}],"url":"https://lore.kernel.org/all/20220913140355.910732567%40linuxfoundation.org/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2155788","reference_id":"2155788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2155788"},{"reference_url":"https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA%40mail.gmail.com/","reference_id":"CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA%40mail.gmail.com","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T18:03:46Z/"}],"url":"https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA%40mail.gmail.com/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6071-1/","reference_id":"USN-6071-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6071-1/"}],"fixed_packages":[],"aliases":["CVE-2022-4662"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qrf7-hb33-tqe4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70000?format=json","vulnerability_id":"VCID-qv8n-1vje-euau","summary":"kernel: Bluetooth: L2CAP: Fix memory leak in vhci_write","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49908.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49908.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49908","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15145","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15248","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49908"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363373","reference_id":"2363373","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363373"},{"reference_url":"https://git.kernel.org/stable/c/5b4f039a2f487c5edae681d763fe1af505f84c13","reference_id":"5b4f039a2f487c5edae681d763fe1af505f84c13","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:01:03Z/"}],"url":"https://git.kernel.org/stable/c/5b4f039a2f487c5edae681d763fe1af505f84c13"},{"reference_url":"https://git.kernel.org/stable/c/7c9524d929648935bac2bbb4c20437df8f9c3f42","reference_id":"7c9524d929648935bac2bbb4c20437df8f9c3f42","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:01:03Z/"}],"url":"https://git.kernel.org/stable/c/7c9524d929648935bac2bbb4c20437df8f9c3f42"},{"reference_url":"https://git.kernel.org/stable/c/aa16cac06b752e5f609c106735bd7838f444784c","reference_id":"aa16cac06b752e5f609c106735bd7838f444784c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:01:03Z/"}],"url":"https://git.kernel.org/stable/c/aa16cac06b752e5f609c106735bd7838f444784c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"}],"fixed_packages":[],"aliases":["CVE-2022-49908"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qv8n-1vje-euau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69298?format=json","vulnerability_id":"VCID-r4dr-87sv-63cx","summary":"kernel: xhci: Fix null pointer dereference in remove if xHC has only one roothub","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49962.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49962.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49962","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07701","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07764","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49962"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373582","reference_id":"2373582","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49962"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r4dr-87sv-63cx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71681?format=json","vulnerability_id":"VCID-rby4-nfdf-z3fu","summary":"kernel: wifi: mac80211: fix queue selection for mesh/OCB interfaces","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49646.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49646.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49646","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2406","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24034","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23978","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23988","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23976","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23959","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23837","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23826","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23784","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24014","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49646"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348256","reference_id":"2348256","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49646"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rby4-nfdf-z3fu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71592?format=json","vulnerability_id":"VCID-rg5z-v1z7-9ygz","summary":"kernel: erspan: do not assume transport header is always set","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49691.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49691.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49691","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1049","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10422","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16387","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1637","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16331","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16263","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16199","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16218","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16256","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16147","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16144","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16105","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16239","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16324","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49691"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348166","reference_id":"2348166","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49691"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rg5z-v1z7-9ygz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73528?format=json","vulnerability_id":"VCID-rha1-h25a-efgw","summary":"kernel: ASoC: soc-pcm: Add NULL check in BE reparenting","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48992.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48992.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48992","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01301","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01407","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01322","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01325","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0131","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01303","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01386","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01396","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01401","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01306","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48992"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/0760acc2e6598ad4f7bd3662db2d907ef0838139","reference_id":"0760acc2e6598ad4f7bd3662db2d907ef0838139","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:24Z/"}],"url":"https://git.kernel.org/stable/c/0760acc2e6598ad4f7bd3662db2d907ef0838139"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320793","reference_id":"2320793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320793"},{"reference_url":"https://git.kernel.org/stable/c/34a9796bf0684bfd54e96a142560d560c21c983b","reference_id":"34a9796bf0684bfd54e96a142560d560c21c983b","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:24Z/"}],"url":"https://git.kernel.org/stable/c/34a9796bf0684bfd54e96a142560d560c21c983b"},{"reference_url":"https://git.kernel.org/stable/c/9f74b9aa8d58c18927bb9b65dd5ba70a5fd61615","reference_id":"9f74b9aa8d58c18927bb9b65dd5ba70a5fd61615","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:24Z/"}],"url":"https://git.kernel.org/stable/c/9f74b9aa8d58c18927bb9b65dd5ba70a5fd61615"},{"reference_url":"https://git.kernel.org/stable/c/d4dd21a79dbb862d2ebcf9ed90e646416009ff0d","reference_id":"d4dd21a79dbb862d2ebcf9ed90e646416009ff0d","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:24Z/"}],"url":"https://git.kernel.org/stable/c/d4dd21a79dbb862d2ebcf9ed90e646416009ff0d"},{"reference_url":"https://git.kernel.org/stable/c/db8f91d424fe0ea6db337aca8bc05908bbce1498","reference_id":"db8f91d424fe0ea6db337aca8bc05908bbce1498","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:24Z/"}],"url":"https://git.kernel.org/stable/c/db8f91d424fe0ea6db337aca8bc05908bbce1498"},{"reference_url":"https://git.kernel.org/stable/c/e7166d6821c15f3516bcac8ae3f155924da1908c","reference_id":"e7166d6821c15f3516bcac8ae3f155924da1908c","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:24Z/"}],"url":"https://git.kernel.org/stable/c/e7166d6821c15f3516bcac8ae3f155924da1908c"},{"reference_url":"https://git.kernel.org/stable/c/f2ba66d8738584d124aff4e760ed1337f5f6dfb6","reference_id":"f2ba66d8738584d124aff4e760ed1337f5f6dfb6","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:24Z/"}],"url":"https://git.kernel.org/stable/c/f2ba66d8738584d124aff4e760ed1337f5f6dfb6"},{"reference_url":"https://git.kernel.org/stable/c/f6f45e538328df9ce66aa61bafee1a5717c4b700","reference_id":"f6f45e538328df9ce66aa61bafee1a5717c4b700","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:16:24Z/"}],"url":"https://git.kernel.org/stable/c/f6f45e538328df9ce66aa61bafee1a5717c4b700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-48992"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rha1-h25a-efgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69259?format=json","vulnerability_id":"VCID-rj99-p8mt-pqg9","summary":"kernel: netfilter: flowtable: fix stuck flows on cleanup due to pending work","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50000.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50000.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50000","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04734","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04751","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373543","reference_id":"2373543","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0101","reference_id":"RHSA-2023:0101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0512","reference_id":"RHSA-2023:0512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15660","reference_id":"RHSA-2025:15660","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15660"}],"fixed_packages":[],"aliases":["CVE-2022-50000"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rj99-p8mt-pqg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69307?format=json","vulnerability_id":"VCID-rmjh-44j9-xyhq","summary":"kernel: ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50015.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50015","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07701","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07764","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50015"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50015"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373591","reference_id":"2373591","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50015"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rmjh-44j9-xyhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69188?format=json","vulnerability_id":"VCID-ry3w-dqa7-efax","summary":"kernel: net/mlx5: LAG, fix logic over MLX5_LAG_FLAG_NDEVS_READY","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50002.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50002.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50002","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10079","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10156","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10052","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10128","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10189","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10228","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10188","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10169","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2576","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25927","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25908","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25878","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25814","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25806","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50002"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373471","reference_id":"2373471","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50002"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ry3w-dqa7-efax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67214?format=json","vulnerability_id":"VCID-s1xr-sbms-ayds","summary":"kernel: iommu/vt-d: Clean up si_domain in the init_dmars() error path","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50482.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50482.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50482","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0306","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50482"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401576","reference_id":"2401576","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0832","reference_id":"RHSA-2023:0832","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0832"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"}],"fixed_packages":[],"aliases":["CVE-2022-50482"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s1xr-sbms-ayds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71432?format=json","vulnerability_id":"VCID-s39x-t73a-xkfh","summary":"kernel: drm/amd/display: Check if modulo is 0 before dividing.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49294.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49294.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49294","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22697","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22656","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.226","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22615","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22612","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22561","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22409","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22398","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22396","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2255","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22627","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49294"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348003","reference_id":"2348003","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49294"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s39x-t73a-xkfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69123?format=json","vulnerability_id":"VCID-s7s9-7ske-nqdb","summary":"kernel: wifi: mac80211: Don't finalize CSA in IBSS mode if state is disconnected","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49942.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49942.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49942","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06275","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06321","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06361","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06353","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06348","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06298","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06337","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19455","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49942"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373421","reference_id":"2373421","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49942"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s7s9-7ske-nqdb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71101?format=json","vulnerability_id":"VCID-s9r3-g94p-f3hj","summary":"kernel: wifi: mac80211: fix use-after-free in chanctx code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49416.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49416","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10083","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17398","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1749","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1755","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17563","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17516","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17463","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17416","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1745","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17362","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1734","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49416"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347666","reference_id":"2347666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347666"},{"reference_url":"https://git.kernel.org/stable/c/265bec4779a38b65e86a25120370f200822dfa76","reference_id":"265bec4779a38b65e86a25120370f200822dfa76","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:18Z/"}],"url":"https://git.kernel.org/stable/c/265bec4779a38b65e86a25120370f200822dfa76"},{"reference_url":"https://git.kernel.org/stable/c/2965c4cdf7ad9ce0796fac5e57debb9519ea721e","reference_id":"2965c4cdf7ad9ce0796fac5e57debb9519ea721e","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:18Z/"}],"url":"https://git.kernel.org/stable/c/2965c4cdf7ad9ce0796fac5e57debb9519ea721e"},{"reference_url":"https://git.kernel.org/stable/c/4ba81e794f0fad6234f644c2da1ae14d5b95e1c4","reference_id":"4ba81e794f0fad6234f644c2da1ae14d5b95e1c4","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:18Z/"}],"url":"https://git.kernel.org/stable/c/4ba81e794f0fad6234f644c2da1ae14d5b95e1c4"},{"reference_url":"https://git.kernel.org/stable/c/4f05a9e15edcdf5b97e0d86ab6ecd5f187289f6c","reference_id":"4f05a9e15edcdf5b97e0d86ab6ecd5f187289f6c","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:18Z/"}],"url":"https://git.kernel.org/stable/c/4f05a9e15edcdf5b97e0d86ab6ecd5f187289f6c"},{"reference_url":"https://git.kernel.org/stable/c/6118bbdf69f4718b02d26bbcf2e497eb66004331","reference_id":"6118bbdf69f4718b02d26bbcf2e497eb66004331","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:18Z/"}],"url":"https://git.kernel.org/stable/c/6118bbdf69f4718b02d26bbcf2e497eb66004331"},{"reference_url":"https://git.kernel.org/stable/c/82c8e7bbdd06c7ed58e22450cc5b37f33a25bb2c","reference_id":"82c8e7bbdd06c7ed58e22450cc5b37f33a25bb2c","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:18Z/"}],"url":"https://git.kernel.org/stable/c/82c8e7bbdd06c7ed58e22450cc5b37f33a25bb2c"},{"reference_url":"https://git.kernel.org/stable/c/88cc8f963febe192d6ded9df7217f92f380b449a","reference_id":"88cc8f963febe192d6ded9df7217f92f380b449a","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:18Z/"}],"url":"https://git.kernel.org/stable/c/88cc8f963febe192d6ded9df7217f92f380b449a"},{"reference_url":"https://git.kernel.org/stable/c/9f1e5cc85ad77e52f54049a94db0407445ae2a34","reference_id":"9f1e5cc85ad77e52f54049a94db0407445ae2a34","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:18Z/"}],"url":"https://git.kernel.org/stable/c/9f1e5cc85ad77e52f54049a94db0407445ae2a34"},{"reference_url":"https://git.kernel.org/stable/c/b79110f2bf6022e60e590d2e094728a8eec3e79e","reference_id":"b79110f2bf6022e60e590d2e094728a8eec3e79e","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:18Z/"}],"url":"https://git.kernel.org/stable/c/b79110f2bf6022e60e590d2e094728a8eec3e79e"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49416"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s9r3-g94p-f3hj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71453?format=json","vulnerability_id":"VCID-sam3-5t81-ekf6","summary":"kernel: tcp: tcp_rtx_synack() can be called from process context","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49372.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49372.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49372","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09788","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09738","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17634","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17652","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17605","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17553","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17498","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17542","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17451","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17429","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1736","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17485","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17574","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49372"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348024","reference_id":"2348024","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49372"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sam3-5t81-ekf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69308?format=json","vulnerability_id":"VCID-skda-khna-c3cf","summary":"kernel: drm/amd/pm: add missing ->fini_microcode interface for Sienna Cichlid","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49966.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49966.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49966","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06468","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0651","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06596","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06588","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06579","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20086","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20084","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19964","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49966"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373592","reference_id":"2373592","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49966"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-skda-khna-c3cf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79002?format=json","vulnerability_id":"VCID-sv4s-h2k7-aygu","summary":"kernel: Report vmalloc UAF in dvb-core/dmxdev","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41218.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-41218","reference_id":"","reference_type":"","scores":[{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62204","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62234","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62286","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62276","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62254","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62299","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62291","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62301","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62317","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-41218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/09/24/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/09/24/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/09/24/2","reference_id":"2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/09/24/2"},{"reference_url":"https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/","reference_id":"20220908132754.30532-1-tiwai%40suse.de","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/"}],"url":"https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122960","reference_id":"2122960","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122960"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/09/23/4","reference_id":"4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/09/23/4"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c","reference_id":"dmxdev.c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c"},{"reference_url":"https://www.debian.org/security/2023/dsa-5324","reference_id":"dsa-5324","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/"}],"url":"https://www.debian.org/security/2023/dsa-5324"},{"reference_url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792","reference_id":"?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/"}],"url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5915-1/","reference_id":"USN-5915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5915-1/"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/5981-1/","reference_id":"USN-5981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5981-1/"},{"reference_url":"https://usn.ubuntu.com/5982-1/","reference_id":"USN-5982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5982-1/"},{"reference_url":"https://usn.ubuntu.com/5984-1/","reference_id":"USN-5984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5984-1/"},{"reference_url":"https://usn.ubuntu.com/5987-1/","reference_id":"USN-5987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5987-1/"},{"reference_url":"https://usn.ubuntu.com/5991-1/","reference_id":"USN-5991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5991-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6004-1/","reference_id":"USN-6004-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6004-1/"},{"reference_url":"https://usn.ubuntu.com/6009-1/","reference_id":"USN-6009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6009-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6024-1/","reference_id":"USN-6024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6024-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"}],"fixed_packages":[],"aliases":["CVE-2022-41218"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sv4s-h2k7-aygu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65692?format=json","vulnerability_id":"VCID-szp6-bpdr-bfbf","summary":"kernel: scsi: smartpqi: Correct device removal for multi-actuator devices","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50768.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50768.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50768","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09303","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50768"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425080","reference_id":"2425080","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50768"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-szp6-bpdr-bfbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69213?format=json","vulnerability_id":"VCID-thtc-v485-eyef","summary":"kernel: drm/fb-helper: Fix out-of-bounds access","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50221.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50221.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50221","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08254","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08277","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08257","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22927","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2315","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23112","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22935","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22928","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50221"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373496","reference_id":"2373496","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50221"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-thtc-v485-eyef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69990?format=json","vulnerability_id":"VCID-tvy6-bkdb-xuf8","summary":"kernel: RDMA/core: Fix null-ptr-deref in ib_core_cleanup()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49925.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49925.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49925","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15538","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15366","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1541","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15497","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15548","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15512","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15474","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15408","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15328","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15333","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15424","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15422","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15608","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49925"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/07c0d131cc0fe1f3981a42958fc52d573d303d89","reference_id":"07c0d131cc0fe1f3981a42958fc52d573d303d89","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T14:57:14Z/"}],"url":"https://git.kernel.org/stable/c/07c0d131cc0fe1f3981a42958fc52d573d303d89"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363363","reference_id":"2363363","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363363"},{"reference_url":"https://git.kernel.org/stable/c/6b3d5dcb12347f3518308c2c9d2cf72453a3e1e5","reference_id":"6b3d5dcb12347f3518308c2c9d2cf72453a3e1e5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T14:57:14Z/"}],"url":"https://git.kernel.org/stable/c/6b3d5dcb12347f3518308c2c9d2cf72453a3e1e5"},{"reference_url":"https://git.kernel.org/stable/c/ab817f75e5e0fa58d9be0825da6a7b7d8a1fa1d9","reference_id":"ab817f75e5e0fa58d9be0825da6a7b7d8a1fa1d9","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T14:57:14Z/"}],"url":"https://git.kernel.org/stable/c/ab817f75e5e0fa58d9be0825da6a7b7d8a1fa1d9"},{"reference_url":"https://git.kernel.org/stable/c/af8fb5a0600e9ae29950e9422a032c3c22649ee5","reference_id":"af8fb5a0600e9ae29950e9422a032c3c22649ee5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T14:57:14Z/"}],"url":"https://git.kernel.org/stable/c/af8fb5a0600e9ae29950e9422a032c3c22649ee5"},{"reference_url":"https://git.kernel.org/stable/c/d360e875c011a005628525bf290322058927e7dc","reference_id":"d360e875c011a005628525bf290322058927e7dc","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T14:57:14Z/"}],"url":"https://git.kernel.org/stable/c/d360e875c011a005628525bf290322058927e7dc"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49925"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tvy6-bkdb-xuf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69208?format=json","vulnerability_id":"VCID-u1cs-fdvf-wkdu","summary":"kernel: arm64: cacheinfo: Fix incorrect assignment of signed error value to unsigned fw_level","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49964.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49964.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49964","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07701","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07764","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49964"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373491","reference_id":"2373491","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49964"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u1cs-fdvf-wkdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71181?format=json","vulnerability_id":"VCID-uafr-w554-8khy","summary":"kernel: fbdev: defio: fix the pagelist corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49511.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49511","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08382","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08329","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34627","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34603","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34642","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34628","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34353","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34333","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34248","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34592","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34635","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49511"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347746","reference_id":"2347746","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347746"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49511"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uafr-w554-8khy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69383?format=json","vulnerability_id":"VCID-udj3-14pz-v3e7","summary":"kernel: virtio-gpu: fix a missing check to avoid NULL dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50181.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50181.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50181","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06223","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06263","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06244","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06289","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0633","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06317","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06305","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19324","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19363","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50181"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373666","reference_id":"2373666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50181"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-udj3-14pz-v3e7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69134?format=json","vulnerability_id":"VCID-uemy-57gh-m7dn","summary":"kernel: crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50226.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50226.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50226","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06223","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06263","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06244","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06289","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0633","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06317","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06305","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19324","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19363","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50226","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50226"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373428","reference_id":"2373428","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50226"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uemy-57gh-m7dn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67129?format=json","vulnerability_id":"VCID-ujcw-npmr-1uae","summary":"kernel: netfilter: ipset: Rework long task execution when adding/deleting entries","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53549.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53549.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53549","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01516","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01527","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0153","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01521","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01513","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01499","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01515","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0161","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01627","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-53549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53549"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401491","reference_id":"2401491","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"}],"fixed_packages":[],"aliases":["CVE-2023-53549"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ujcw-npmr-1uae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69185?format=json","vulnerability_id":"VCID-uqcv-3662-vudf","summary":"kernel: staging: fbtft: core: set smem_len before fb_deferred_io_init call","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50130.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50130.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50130","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06468","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0651","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06596","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06588","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06579","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20086","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20084","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19964","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50130"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373468","reference_id":"2373468","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50130"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uqcv-3662-vudf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67925?format=json","vulnerability_id":"VCID-uspu-t854-j3an","summary":"kernel: NFSD: Protect against send buffer overflow in NFSv2 READDIR","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50235.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50235.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50235","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03062","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03087","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03045","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03059","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04252","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04264","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04283","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04317","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04195","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04178","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04123","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50235"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50235"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395362","reference_id":"2395362","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0832","reference_id":"RHSA-2023:0832","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0832"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50235"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uspu-t854-j3an"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71577?format=json","vulnerability_id":"VCID-uw9m-atc6-2yg8","summary":"kernel: iavf: Fix handling of dummy receive descriptors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49583.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49583.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49583","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22068","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22041","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21981","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21979","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21974","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.2193","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21783","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21772","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21764","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21932","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22013","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49583"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348151","reference_id":"2348151","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49583"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uw9m-atc6-2yg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69352?format=json","vulnerability_id":"VCID-uzjj-fu59-1uhh","summary":"kernel: drm/amd/display: clear optc underflow before turn off odm clock","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49969.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49969.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49969","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06428","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06508","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06505","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06498","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06488","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19776","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19921","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19806","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49969"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373635","reference_id":"2373635","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17159","reference_id":"RHSA-2025:17159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17192","reference_id":"RHSA-2025:17192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18043","reference_id":"RHSA-2025:18043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21667","reference_id":"RHSA-2025:21667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"}],"fixed_packages":[],"aliases":["CVE-2022-49969"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uzjj-fu59-1uhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69334?format=json","vulnerability_id":"VCID-v1jm-s6sa-yqcb","summary":"kernel: net/sched: fix netdevice reference leaks in attach_default_qdiscs()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49958.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49958.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49958","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06468","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0651","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06596","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06588","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06579","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20086","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20084","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19964","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49958"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49958","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49958"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373618","reference_id":"2373618","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49958"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v1jm-s6sa-yqcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71537?format=json","vulnerability_id":"VCID-v242-k37u-nybh","summary":"kernel: Linux kernel (ath10k): Double free vulnerability during suspend/resume","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49519.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49519.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49519","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10655","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10593","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22365","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22323","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22269","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22263","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22215","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22065","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22052","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22039","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22207","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2229","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49519"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348111","reference_id":"2348111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49519"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v242-k37u-nybh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71198?format=json","vulnerability_id":"VCID-v4uk-5325-byf8","summary":"kernel: net/mlx5: E-Switch, pair only capable devices","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49333.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49333.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49333","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08329","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08382","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21784","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21755","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21507","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21651","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21727","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21526","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22358","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49333"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347763","reference_id":"2347763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347763"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49333"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v4uk-5325-byf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69369?format=json","vulnerability_id":"VCID-v7ex-q9pm-7kf3","summary":"kernel: netfilter: nft_tproxy: restrict to prerouting hook","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50001.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50001.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50001","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06275","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06321","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06361","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06353","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06348","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06298","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06337","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19455","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50001"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373652","reference_id":"2373652","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373652"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50001"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v7ex-q9pm-7kf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67593?format=json","vulnerability_id":"VCID-v9q1-cbq6-9bbc","summary":"kernel: wifi: ath11k: mhi: fix potential memory leak in ath11k_mhi_register()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50418.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50418","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01824","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02186","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02197","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02281","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02261","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02252","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02295","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50418"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/015ced9eb63b8b19cb725a1d592d150b60494ced","reference_id":"015ced9eb63b8b19cb725a1d592d150b60494ced","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:11:03Z/"}],"url":"https://git.kernel.org/stable/c/015ced9eb63b8b19cb725a1d592d150b60494ced"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396520","reference_id":"2396520","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396520"},{"reference_url":"https://git.kernel.org/stable/c/43e7c3505ec70db3d3c6458824d5fa40f62e3e7b","reference_id":"43e7c3505ec70db3d3c6458824d5fa40f62e3e7b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:11:03Z/"}],"url":"https://git.kernel.org/stable/c/43e7c3505ec70db3d3c6458824d5fa40f62e3e7b"},{"reference_url":"https://git.kernel.org/stable/c/72ef896e80b6ec7cdc1dd42577045f8e7c9c32b3","reference_id":"72ef896e80b6ec7cdc1dd42577045f8e7c9c32b3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:11:03Z/"}],"url":"https://git.kernel.org/stable/c/72ef896e80b6ec7cdc1dd42577045f8e7c9c32b3"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50418"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v9q1-cbq6-9bbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79682?format=json","vulnerability_id":"VCID-v9sh-maqh-puec","summary":"kernel: Soft lockup occurred during __page_mapcount","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1582.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1582.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1582","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02348","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0235","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02371","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02335","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02334","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02319","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02325","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02421","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03002","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02987","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03482","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03529","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03477","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1582"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180936","reference_id":"2180936","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180936"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0%40kroah.com/","reference_id":"Yg6ac8WlwtnDH6M0%40kroah.com","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:00:24Z/"}],"url":"https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0%40kroah.com/"}],"fixed_packages":[],"aliases":["CVE-2023-1582"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v9sh-maqh-puec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65667?format=json","vulnerability_id":"VCID-vf5k-3h1y-g7gh","summary":"kernel: net/mlx5: Fix possible use-after-free in async command interface","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50726.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50726.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50726","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10146","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10199","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50726"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425054","reference_id":"2425054","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50726"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vf5k-3h1y-g7gh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69388?format=json","vulnerability_id":"VCID-vksm-pnu3-rycv","summary":"kernel: scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49986.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49986.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49986","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04654","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04689","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04703","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04748","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04739","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0472","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04704","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14991","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14945","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14955","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15008","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15047","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15049","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49986"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49986","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49986"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373671","reference_id":"2373671","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49986"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vksm-pnu3-rycv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78779?format=json","vulnerability_id":"VCID-vmbf-nbfs-5bbb","summary":"kernel: slab-out-of-bounds read vulnerabilities in cbq_classify","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23454.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23454.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23454","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11217","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11383","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11323","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1128","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.1861","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18836","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18609","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18597","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18701","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18748","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18743","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18889","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18689","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/01/10/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/01/10/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168297","reference_id":"2168297","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168297"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/01/10/4","reference_id":"4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/01/10/4"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://www.debian.org/security/2023/dsa-5324","reference_id":"dsa-5324","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/"}],"url":"https://www.debian.org/security/2023/dsa-5324"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12","reference_id":"?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5915-1/","reference_id":"USN-5915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5915-1/"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/5982-1/","reference_id":"USN-5982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5982-1/"},{"reference_url":"https://usn.ubuntu.com/5987-1/","reference_id":"USN-5987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5987-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6004-1/","reference_id":"USN-6004-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6004-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"}],"fixed_packages":[],"aliases":["CVE-2023-23454"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vmbf-nbfs-5bbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71631?format=json","vulnerability_id":"VCID-vqbz-4mev-mkhf","summary":"kernel: tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49330.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49330.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49330","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07529","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16509","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16492","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16453","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16392","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16332","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16353","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16388","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16278","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16236","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16449","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49330","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49330"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348206","reference_id":"2348206","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49330"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqbz-4mev-mkhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79367?format=json","vulnerability_id":"VCID-vqy7-37ym-eufr","summary":"kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36879","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06944","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0682","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06849","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06904","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06935","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06932","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06925","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0686","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06842","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06984","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06971","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06975","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119855","reference_id":"2119855","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119855"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901","reference_id":"commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901"},{"reference_url":"https://www.debian.org/security/2022/dsa-5207","reference_id":"dsa-5207","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/"}],"url":"https://www.debian.org/security/2022/dsa-5207"},{"reference_url":"https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901","reference_id":"f85daf0e725358be78dfd208dea5fd665d8cb901","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/"}],"url":"https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html","reference_id":"msg00011.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220901-0007/","reference_id":"ntap-20220901-0007","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220901-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5627","reference_id":"RHSA-2023:5627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0431","reference_id":"RHSA-2024:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0432","reference_id":"RHSA-2024:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0432"},{"reference_url":"https://usn.ubuntu.com/5667-1/","reference_id":"USN-5667-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5667-1/"},{"reference_url":"https://usn.ubuntu.com/5668-1/","reference_id":"USN-5668-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5668-1/"},{"reference_url":"https://usn.ubuntu.com/5677-1/","reference_id":"USN-5677-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5677-1/"},{"reference_url":"https://usn.ubuntu.com/5682-1/","reference_id":"USN-5682-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5682-1/"},{"reference_url":"https://usn.ubuntu.com/5683-1/","reference_id":"USN-5683-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5683-1/"},{"reference_url":"https://usn.ubuntu.com/5703-1/","reference_id":"USN-5703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5703-1/"},{"reference_url":"https://usn.ubuntu.com/5706-1/","reference_id":"USN-5706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5706-1/"},{"reference_url":"https://usn.ubuntu.com/5727-1/","reference_id":"USN-5727-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5727-1/"},{"reference_url":"https://usn.ubuntu.com/5727-2/","reference_id":"USN-5727-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5727-2/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"},{"reference_url":"https://usn.ubuntu.com/5913-1/","reference_id":"USN-5913-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5913-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"}],"fixed_packages":[],"aliases":["CVE-2022-36879"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqy7-37ym-eufr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69271?format=json","vulnerability_id":"VCID-vswg-eg1n-gqc6","summary":"kernel: driver core: fix potential deadlock in __driver_attach","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50149.json","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50149.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50149","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05808","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05854","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05849","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05888","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05919","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05898","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0588","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18125","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18239","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18252","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18279","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18178","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18161","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50149"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373555","reference_id":"2373555","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50149"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vswg-eg1n-gqc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79094?format=json","vulnerability_id":"VCID-vzpr-mm8p-yygx","summary":"kernel: netfilter: nf_conntrack_irc message handling issue","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2663.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2663.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2663","reference_id":"","reference_type":"","scores":[{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38947","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39379","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39351","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39264","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39049","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3903","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39363","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39387","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39356","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39373","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39345","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39327","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2123056","reference_id":"2123056","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2123056"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5791-1/","reference_id":"USN-5791-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-1/"},{"reference_url":"https://usn.ubuntu.com/5791-2/","reference_id":"USN-5791-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-2/"},{"reference_url":"https://usn.ubuntu.com/5791-3/","reference_id":"USN-5791-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-3/"},{"reference_url":"https://usn.ubuntu.com/5792-1/","reference_id":"USN-5792-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5792-1/"},{"reference_url":"https://usn.ubuntu.com/5792-2/","reference_id":"USN-5792-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5792-2/"},{"reference_url":"https://usn.ubuntu.com/5793-1/","reference_id":"USN-5793-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-1/"},{"reference_url":"https://usn.ubuntu.com/5793-2/","reference_id":"USN-5793-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-2/"},{"reference_url":"https://usn.ubuntu.com/5793-3/","reference_id":"USN-5793-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-3/"},{"reference_url":"https://usn.ubuntu.com/5793-4/","reference_id":"USN-5793-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-4/"},{"reference_url":"https://usn.ubuntu.com/5815-1/","reference_id":"USN-5815-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5815-1/"},{"reference_url":"https://usn.ubuntu.com/5854-1/","reference_id":"USN-5854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5854-1/"},{"reference_url":"https://usn.ubuntu.com/5861-1/","reference_id":"USN-5861-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5861-1/"},{"reference_url":"https://usn.ubuntu.com/5862-1/","reference_id":"USN-5862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5862-1/"},{"reference_url":"https://usn.ubuntu.com/5865-1/","reference_id":"USN-5865-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5865-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6247-1/","reference_id":"USN-6247-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6247-1/"}],"fixed_packages":[],"aliases":["CVE-2022-2663"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vzpr-mm8p-yygx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79665?format=json","vulnerability_id":"VCID-war3-a6kb-r7fx","summary":"kernel: Executable Space Protection Bypass","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25265.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25265.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-25265","reference_id":"","reference_type":"","scores":[{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50513","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50568","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50564","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50607","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50569","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50611","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50616","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50594","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50543","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.5055","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50505","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50585","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-25265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25265"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055499","reference_id":"2055499","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"}],"fixed_packages":[],"aliases":["CVE-2022-25265"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-war3-a6kb-r7fx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79433?format=json","vulnerability_id":"VCID-wcxk-yf59-c3h2","summary":"kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30594.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-30594","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0626","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06346","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06264","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07008","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06995","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06998","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06963","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06959","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06951","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06946","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06882","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06865","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-30594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2085300","reference_id":"2085300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2085300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7318","reference_id":"RHSA-2022:7318","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7318"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7319","reference_id":"RHSA-2022:7319","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7319"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0300","reference_id":"RHSA-2023:0300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0334","reference_id":"RHSA-2023:0334","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5442-1/","reference_id":"USN-5442-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5442-1/"},{"reference_url":"https://usn.ubuntu.com/5442-2/","reference_id":"USN-5442-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5442-2/"},{"reference_url":"https://usn.ubuntu.com/5443-1/","reference_id":"USN-5443-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5443-1/"},{"reference_url":"https://usn.ubuntu.com/5443-2/","reference_id":"USN-5443-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5443-2/"},{"reference_url":"https://usn.ubuntu.com/5465-1/","reference_id":"USN-5465-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5465-1/"}],"fixed_packages":[],"aliases":["CVE-2022-30594"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wcxk-yf59-c3h2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65342?format=json","vulnerability_id":"VCID-wev8-dr84-fyhp","summary":"kernel: dm integrity: Fix UAF in dm_integrity_dtr()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50889.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50889.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50889","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10793","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50889"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426118","reference_id":"2426118","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426118"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50889"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wev8-dr84-fyhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67030?format=json","vulnerability_id":"VCID-wgf7-qj2g-bkdq","summary":"kernel: dm thin: Use last transaction's pmd->root when commit failed","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50534.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50534.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50534","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02576","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02693","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02724","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50534"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50534","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50534"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402282","reference_id":"2402282","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50534"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wgf7-qj2g-bkdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69141?format=json","vulnerability_id":"VCID-wkju-5p5k-z3g1","summary":"kernel: mptcp: do not queue data on closed subflows","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50070.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50070.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50070","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05137","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05159","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05192","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05181","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05164","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16018","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16114","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16132","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16059","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16057","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50070"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50070","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50070"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373435","reference_id":"2373435","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19222","reference_id":"RHSA-2025:19222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19268","reference_id":"RHSA-2025:19268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19492","reference_id":"RHSA-2025:19492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22752","reference_id":"RHSA-2025:22752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22752"},{"reference_url":"https://usn.ubuntu.com/7909-1/","reference_id":"USN-7909-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-1/"},{"reference_url":"https://usn.ubuntu.com/7909-2/","reference_id":"USN-7909-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-2/"},{"reference_url":"https://usn.ubuntu.com/7909-3/","reference_id":"USN-7909-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-3/"},{"reference_url":"https://usn.ubuntu.com/7909-4/","reference_id":"USN-7909-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-4/"},{"reference_url":"https://usn.ubuntu.com/7909-5/","reference_id":"USN-7909-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7909-5/"},{"reference_url":"https://usn.ubuntu.com/7910-1/","reference_id":"USN-7910-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7910-1/"},{"reference_url":"https://usn.ubuntu.com/7910-2/","reference_id":"USN-7910-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7910-2/"},{"reference_url":"https://usn.ubuntu.com/7933-1/","reference_id":"USN-7933-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7933-1/"},{"reference_url":"https://usn.ubuntu.com/7938-1/","reference_id":"USN-7938-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7938-1/"}],"fixed_packages":[],"aliases":["CVE-2022-50070"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wkju-5p5k-z3g1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79295?format=json","vulnerability_id":"VCID-wudq-7hws-aqft","summary":"kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39188.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39188.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39188","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04387","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04411","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04457","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04467","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04452","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04403","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04546","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04578","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04642","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130141","reference_id":"2130141","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3388","reference_id":"RHSA-2023:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4801","reference_id":"RHSA-2023:4801","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4801"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4814","reference_id":"RHSA-2023:4814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4814"},{"reference_url":"https://usn.ubuntu.com/5790-1/","reference_id":"USN-5790-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5790-1/"},{"reference_url":"https://usn.ubuntu.com/5791-1/","reference_id":"USN-5791-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-1/"},{"reference_url":"https://usn.ubuntu.com/5791-2/","reference_id":"USN-5791-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-2/"},{"reference_url":"https://usn.ubuntu.com/5791-3/","reference_id":"USN-5791-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-3/"},{"reference_url":"https://usn.ubuntu.com/5792-1/","reference_id":"USN-5792-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5792-1/"},{"reference_url":"https://usn.ubuntu.com/5792-2/","reference_id":"USN-5792-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5792-2/"},{"reference_url":"https://usn.ubuntu.com/5815-1/","reference_id":"USN-5815-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5815-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"}],"fixed_packages":[],"aliases":["CVE-2022-39188"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wudq-7hws-aqft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76468?format=json","vulnerability_id":"VCID-wvgn-ath2-w3hp","summary":"kernel: regmap: spi: Reserve space for register address/padding","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48696.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48696.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48696","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03539","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03657","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03461","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03473","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.036","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03607","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03612","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03553","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03562","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03513","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03487","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48696"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/15ff1f17847c19174b260bd7dd0de33edcebd45e","reference_id":"15ff1f17847c19174b260bd7dd0de33edcebd45e","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T19:17:13Z/"}],"url":"https://git.kernel.org/stable/c/15ff1f17847c19174b260bd7dd0de33edcebd45e"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278959","reference_id":"2278959","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278959"},{"reference_url":"https://git.kernel.org/stable/c/f5723cfc01932c7a8d5c78dbf7e067e537c91439","reference_id":"f5723cfc01932c7a8d5c78dbf7e067e537c91439","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T19:17:13Z/"}],"url":"https://git.kernel.org/stable/c/f5723cfc01932c7a8d5c78dbf7e067e537c91439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-48696"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wvgn-ath2-w3hp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69121?format=json","vulnerability_id":"VCID-x6px-n28w-c7h3","summary":"kernel: wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50164.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50164.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50164","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06428","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06508","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06505","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06498","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06488","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19776","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19921","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19806","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50164"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50164","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50164"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373419","reference_id":"2373419","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8809","reference_id":"RHSA-2022:8809","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8809"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50164"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x6px-n28w-c7h3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65810?format=json","vulnerability_id":"VCID-xb4c-7vqv-2qfy","summary":"kernel: Linux kernel: Hard lockup in lpfc driver leads to Denial of Service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50744.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50744.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50744","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10017","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50744"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425198","reference_id":"2425198","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50744"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xb4c-7vqv-2qfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69399?format=json","vulnerability_id":"VCID-xc9u-jbrx-cfbk","summary":"kernel: usb: xhci_plat_remove: avoid NULL dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50133.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50133","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07701","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07764","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50133"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373682","reference_id":"2373682","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50133"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xc9u-jbrx-cfbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67172?format=json","vulnerability_id":"VCID-xfqm-tv4x-d7ev","summary":"kernel: dm cache: Fix UAF in destroy()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50496.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50496.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50496","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.027","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02714","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02719","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02722","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02713","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02697","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02694","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02673","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02681","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02795","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02786","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02775","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02833","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50496"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50496","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50496"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401534","reference_id":"2401534","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50496"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xfqm-tv4x-d7ev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80668?format=json","vulnerability_id":"VCID-xp56-daaq-r7fg","summary":"kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33656.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33656.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33656","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08573","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.086","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0857","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08668","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08643","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0863","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0852","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08507","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08659","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08671","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08626","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08627","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33656"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108696","reference_id":"2108696","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4789","reference_id":"RHSA-2023:4789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4789"},{"reference_url":"https://usn.ubuntu.com/5580-1/","reference_id":"USN-5580-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5580-1/"},{"reference_url":"https://usn.ubuntu.com/5589-1/","reference_id":"USN-5589-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5589-1/"},{"reference_url":"https://usn.ubuntu.com/5591-1/","reference_id":"USN-5591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5591-1/"},{"reference_url":"https://usn.ubuntu.com/5591-2/","reference_id":"USN-5591-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5591-2/"},{"reference_url":"https://usn.ubuntu.com/5591-3/","reference_id":"USN-5591-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5591-3/"},{"reference_url":"https://usn.ubuntu.com/5591-4/","reference_id":"USN-5591-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5591-4/"},{"reference_url":"https://usn.ubuntu.com/5592-1/","reference_id":"USN-5592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5592-1/"},{"reference_url":"https://usn.ubuntu.com/5595-1/","reference_id":"USN-5595-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5595-1/"},{"reference_url":"https://usn.ubuntu.com/5597-1/","reference_id":"USN-5597-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5597-1/"},{"reference_url":"https://usn.ubuntu.com/5598-1/","reference_id":"USN-5598-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5598-1/"},{"reference_url":"https://usn.ubuntu.com/5600-1/","reference_id":"USN-5600-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5600-1/"},{"reference_url":"https://usn.ubuntu.com/5603-1/","reference_id":"USN-5603-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5603-1/"},{"reference_url":"https://usn.ubuntu.com/5605-1/","reference_id":"USN-5605-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5605-1/"},{"reference_url":"https://usn.ubuntu.com/5650-1/","reference_id":"USN-5650-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5650-1/"}],"fixed_packages":[],"aliases":["CVE-2021-33656"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xp56-daaq-r7fg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69300?format=json","vulnerability_id":"VCID-xtz5-jvwh-qubw","summary":"kernel: drm/amd/pm: Fix a potential gpu_metrics_table memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49971.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49971.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49971","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07701","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07764","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49971"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373584","reference_id":"2373584","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373584"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49971"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xtz5-jvwh-qubw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69325?format=json","vulnerability_id":"VCID-xvhv-vq8r-6ye1","summary":"kernel: ice: Fix call trace with null VSI during VF reset","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50041.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50041.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50041","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01456","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01461","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01463","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01449","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01451","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08662","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08552","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08539","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08692","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08706","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08659","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50041"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373609","reference_id":"2373609","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50041"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xvhv-vq8r-6ye1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79145?format=json","vulnerability_id":"VCID-xxe5-16mk-dqe5","summary":"kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4129.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4129.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4129","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05026","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04989","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0503","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05365","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05709","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05739","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05776","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05782","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0579","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05811","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0575","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05746","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134528","reference_id":"2134528","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134528"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/","reference_id":"7X5SPXMXXFANDASPCKER2JIQO2F3UHCP","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/","reference_id":"AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/","reference_id":"JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t","reference_id":"t","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/"}],"url":"https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t"},{"reference_url":"https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t","reference_id":"t","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/"}],"url":"https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t"},{"reference_url":"https://usn.ubuntu.com/6025-1/","reference_id":"USN-6025-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6025-1/"},{"reference_url":"https://usn.ubuntu.com/6027-1/","reference_id":"USN-6027-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6027-1/"},{"reference_url":"https://usn.ubuntu.com/6040-1/","reference_id":"USN-6040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6040-1/"},{"reference_url":"https://usn.ubuntu.com/6057-1/","reference_id":"USN-6057-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6057-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6093-1/","reference_id":"USN-6093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6093-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2022-4129"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xxe5-16mk-dqe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71210?format=json","vulnerability_id":"VCID-xxpw-gvwe-6ugs","summary":"kernel: RDMA/hfi1: Prevent panic when SDMA is disabled","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49429.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49429.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49429","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08046","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08089","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11846","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11856","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11818","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11656","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11776","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11746","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11706","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11626","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1171","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11794","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49429"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49429","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49429"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347775","reference_id":"2347775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-49429"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xxpw-gvwe-6ugs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71573?format=json","vulnerability_id":"VCID-y53e-9dqj-fqcs","summary":"kernel: i2c: piix4: Fix a memory leak in the EFCH MMIO support","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49653.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49653.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49653","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17305","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16964","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17212","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17152","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1709","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17132","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17038","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1702","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17354","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17133","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17282","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1726","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-49653"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348147","reference_id":"2348147","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348147"},{"reference_url":"https://git.kernel.org/stable/c/8ad59b397f86a4d8014966fdc0552095a0c4fb2b","reference_id":"8ad59b397f86a4d8014966fdc0552095a0c4fb2b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:38Z/"}],"url":"https://git.kernel.org/stable/c/8ad59b397f86a4d8014966fdc0552095a0c4fb2b"},{"reference_url":"https://git.kernel.org/stable/c/a3263e4cf8265f0c9eb0ed8a9b50f132c7a42e19","reference_id":"a3263e4cf8265f0c9eb0ed8a9b50f132c7a42e19","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:38Z/"}],"url":"https://git.kernel.org/stable/c/a3263e4cf8265f0c9eb0ed8a9b50f132c7a42e19"},{"reference_url":"https://git.kernel.org/stable/c/d2bf1a6480e8d44658a8ac3bdcec081238873212","reference_id":"d2bf1a6480e8d44658a8ac3bdcec081238873212","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:38Z/"}],"url":"https://git.kernel.org/stable/c/d2bf1a6480e8d44658a8ac3bdcec081238873212"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"}],"fixed_packages":[],"aliases":["CVE-2022-49653"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y53e-9dqj-fqcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69176?format=json","vulnerability_id":"VCID-y5cw-h3ze-y3bc","summary":"kernel: RDMA/srpt: Fix a use-after-free","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50129.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50129.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50129","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06356","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06401","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0639","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06437","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06481","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06475","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06458","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19812","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19816","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19827","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19723","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19716","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50129"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373458","reference_id":"2373458","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50129"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y5cw-h3ze-y3bc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78959?format=json","vulnerability_id":"VCID-y835-khqt-aybn","summary":"kernel: race condition in hugetlb_no_page() in mm/hugetlb.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3522.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3522.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150979","reference_id":"2150979","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"}],"fixed_packages":[],"aliases":["CVE-2022-3522"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y835-khqt-aybn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67948?format=json","vulnerability_id":"VCID-ye4t-suw5-33g9","summary":"kernel: ASoC: qcom: Add checks for devm_kcalloc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50308.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50308.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50308","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04097","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04128","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04163","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04005","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03977","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0396","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03972","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50308"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395388","reference_id":"2395388","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50308"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ye4t-suw5-33g9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67053?format=json","vulnerability_id":"VCID-ysr5-46f4-a7a4","summary":"kernel: blk-mq: avoid double ->queue_rq() because of early timeout","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50554.json","reference_id":"","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50554.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50554","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01824","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01807","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01915","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0188","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01876","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0211","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50554"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402306","reference_id":"2402306","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50554"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ysr5-46f4-a7a4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69137?format=json","vulnerability_id":"VCID-z4tx-m7zm-tfg3","summary":"kernel: drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50185.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50185","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06428","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06508","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06505","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06498","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06488","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19776","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19921","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19806","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50185"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373431","reference_id":"2373431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50185"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z4tx-m7zm-tfg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75229?format=json","vulnerability_id":"VCID-zc8z-cpdy-xkak","summary":"kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47592.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-47592","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0403","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04068","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04259","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04053","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04064","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04198","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04217","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04087","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04106","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04125","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0411","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04097","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04071","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-47592"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293235","reference_id":"2293235","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293235"},{"reference_url":"https://git.kernel.org/stable/c/97cb5c82aa1dd85a39b1bd021c8b5f18af623779","reference_id":"97cb5c82aa1dd85a39b1bd021c8b5f18af623779","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T15:19:38Z/"}],"url":"https://git.kernel.org/stable/c/97cb5c82aa1dd85a39b1bd021c8b5f18af623779"},{"reference_url":"https://git.kernel.org/stable/c/aeb7c75cb77478fdbf821628e9c95c4baa9adc63","reference_id":"aeb7c75cb77478fdbf821628e9c95c4baa9adc63","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T15:19:38Z/"}],"url":"https://git.kernel.org/stable/c/aeb7c75cb77478fdbf821628e9c95c4baa9adc63"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2021-47592"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zc8z-cpdy-xkak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67154?format=json","vulnerability_id":"VCID-zex7-kjeu-4ugv","summary":"kernel: scsi: qla2xxx: Fix crash when I/O abort times out","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50493.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50493.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50493","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03281","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50493"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401516","reference_id":"2401516","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4130","reference_id":"RHSA-2023:4130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4130"}],"fixed_packages":[],"aliases":["CVE-2022-50493"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zex7-kjeu-4ugv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69116?format=json","vulnerability_id":"VCID-zrer-nkwx-3uhj","summary":"kernel: tools/power turbostat: Fix file pointer leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50189.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50189.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50189","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08254","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08277","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08257","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22927","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2315","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23112","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22935","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22928","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50189"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373414","reference_id":"2373414","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373414"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2022-50189"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zrer-nkwx-3uhj"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-477.10.1%3Farch=el8_8"}