Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/90016?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/90016?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-305.162.1?arch=el8_4", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "4.18.0-305.162.1", "qualifiers": { "arch": "el8_4" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69400?format=api", "vulnerability_id": "VCID-4mhb-xwq8-xyh8", "summary": "kernel: net: atlantic: fix aq_vec index out of range error", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50066.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50066.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50066", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06814", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06879", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06864", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06919", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06949", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06948", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06941", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06937", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20493", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20688", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20684", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20675", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20563", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2056", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20529", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20422", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50066" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50066", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50066" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373683", "reference_id": "2373683", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10671", "reference_id": "RHSA-2025:10671", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10673", "reference_id": "RHSA-2025:10673", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10673" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10675", "reference_id": "RHSA-2025:10675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10761", "reference_id": "RHSA-2025:10761", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10761" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10828", "reference_id": "RHSA-2025:10828", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10829", "reference_id": "RHSA-2025:10829", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10829" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10830", "reference_id": "RHSA-2025:10830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10834", "reference_id": "RHSA-2025:10834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11358", "reference_id": "RHSA-2025:11358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11358" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11375", "reference_id": "RHSA-2025:11375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11375" } ], "fixed_packages": [], "aliases": [ "CVE-2022-50066" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4mhb-xwq8-xyh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71642?format=api", "vulnerability_id": "VCID-exh5-yp4u-eqcg", "summary": "kernel: mt76: fix use-after-free by removing a non-RCU wcid pointer", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49328.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49328.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49328", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01959", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03721", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03573", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03546", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03559", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03685", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03692", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03696", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03743", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03699", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19363", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19415", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.1942", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19372", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2127", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49328" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49328", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49328" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348217", "reference_id": "2348217", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348217" }, { "reference_url": "https://git.kernel.org/stable/c/4448327b41738dbfcda680eb4935ff835568f468", "reference_id": "4448327b41738dbfcda680eb4935ff835568f468", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:47Z/" } ], "url": "https://git.kernel.org/stable/c/4448327b41738dbfcda680eb4935ff835568f468" }, { "reference_url": "https://git.kernel.org/stable/c/51fb1278aa57ae0fc54adaa786e1965362bed4fb", "reference_id": "51fb1278aa57ae0fc54adaa786e1965362bed4fb", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:47Z/" } ], "url": "https://git.kernel.org/stable/c/51fb1278aa57ae0fc54adaa786e1965362bed4fb" }, { "reference_url": "https://git.kernel.org/stable/c/d5f77f1dbb59feae81f88e44551e8e1d8a802d9a", "reference_id": "d5f77f1dbb59feae81f88e44551e8e1d8a802d9a", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:47Z/" } ], "url": "https://git.kernel.org/stable/c/d5f77f1dbb59feae81f88e44551e8e1d8a802d9a" }, { "reference_url": "https://git.kernel.org/stable/c/e55bcdd0bf34a8b10d45ce80ebb3164c5292a17d", "reference_id": "e55bcdd0bf34a8b10d45ce80ebb3164c5292a17d", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:47Z/" } ], "url": "https://git.kernel.org/stable/c/e55bcdd0bf34a8b10d45ce80ebb3164c5292a17d" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10179", "reference_id": "RHSA-2025:10179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10828", "reference_id": "RHSA-2025:10828", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9493", "reference_id": "RHSA-2025:9493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9494", "reference_id": "RHSA-2025:9494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9498", "reference_id": "RHSA-2025:9498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9498" } ], "fixed_packages": [], "aliases": [ "CVE-2022-49328" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-exh5-yp4u-eqcg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70063?format=api", "vulnerability_id": "VCID-gphx-7wuy-q7cj", "summary": "kernel: udf: Fix a slab-out-of-bounds write bug in udf_find_entry()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49846.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49846.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49846", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14298", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14094", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14361", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14169", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14251", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14305", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14212", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14156", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14047", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14045", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14122", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14158", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14133", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14064", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13937", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49846" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49846", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49846" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/03f9582a6a2ebd25a440896475c968428c4b63e7", "reference_id": "03f9582a6a2ebd25a440896475c968428c4b63e7", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/" } ], "url": "https://git.kernel.org/stable/c/03f9582a6a2ebd25a440896475c968428c4b63e7" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363432", "reference_id": "2363432", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363432" }, { "reference_url": "https://git.kernel.org/stable/c/583fdd98d94acba1e7225e5cc29063aef0741030", "reference_id": "583fdd98d94acba1e7225e5cc29063aef0741030", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/" } ], "url": "https://git.kernel.org/stable/c/583fdd98d94acba1e7225e5cc29063aef0741030" }, { "reference_url": "https://git.kernel.org/stable/c/7a6051d734f1ed0031e2216f9a538621235c11a4", "reference_id": "7a6051d734f1ed0031e2216f9a538621235c11a4", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/" } ], "url": "https://git.kernel.org/stable/c/7a6051d734f1ed0031e2216f9a538621235c11a4" }, { "reference_url": "https://git.kernel.org/stable/c/ac79001b8e603226fab17240a79cb9ef679d3cd9", "reference_id": "ac79001b8e603226fab17240a79cb9ef679d3cd9", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/" } ], "url": "https://git.kernel.org/stable/c/ac79001b8e603226fab17240a79cb9ef679d3cd9" }, { "reference_url": "https://git.kernel.org/stable/c/c736ed8541605e3a25075bb1cbf8f38cb3083238", "reference_id": "c736ed8541605e3a25075bb1cbf8f38cb3083238", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/" } ], "url": "https://git.kernel.org/stable/c/c736ed8541605e3a25075bb1cbf8f38cb3083238" }, { "reference_url": "https://git.kernel.org/stable/c/c8af247de385ce49afabc3bf1cf4fd455c94bfe8", "reference_id": "c8af247de385ce49afabc3bf1cf4fd455c94bfe8", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/" } ], "url": "https://git.kernel.org/stable/c/c8af247de385ce49afabc3bf1cf4fd455c94bfe8" }, { "reference_url": "https://git.kernel.org/stable/c/d8971f410739a864c537e0ac29344a7b6c450232", "reference_id": "d8971f410739a864c537e0ac29344a7b6c450232", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/" } ], "url": "https://git.kernel.org/stable/c/d8971f410739a864c537e0ac29344a7b6c450232" }, { "reference_url": "https://git.kernel.org/stable/c/f1517721c408631f09d54c743aa70cb07fd3eebd", "reference_id": "f1517721c408631f09d54c743aa70cb07fd3eebd", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T16:59:56Z/" } ], "url": "https://git.kernel.org/stable/c/f1517721c408631f09d54c743aa70cb07fd3eebd" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10379", "reference_id": "RHSA-2025:10379", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10379" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10669", "reference_id": "RHSA-2025:10669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10670", "reference_id": "RHSA-2025:10670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10671", "reference_id": "RHSA-2025:10671", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10673", "reference_id": "RHSA-2025:10673", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10673" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10675", "reference_id": "RHSA-2025:10675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10701", "reference_id": "RHSA-2025:10701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10761", "reference_id": "RHSA-2025:10761", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10761" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10828", "reference_id": "RHSA-2025:10828", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10829", "reference_id": "RHSA-2025:10829", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10829" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10830", "reference_id": "RHSA-2025:10830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10834", "reference_id": "RHSA-2025:10834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10974", "reference_id": "RHSA-2025:10974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10976", "reference_id": "RHSA-2025:10976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10976" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10977", "reference_id": "RHSA-2025:10977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10978", "reference_id": "RHSA-2025:10978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10978" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10979", "reference_id": "RHSA-2025:10979", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10979" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10980", "reference_id": "RHSA-2025:10980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10981", "reference_id": "RHSA-2025:10981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10981" } ], "fixed_packages": [], "aliases": [ "CVE-2022-49846" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gphx-7wuy-q7cj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71332?format=api", "vulnerability_id": "VCID-tawg-cw1b-4fc6", "summary": "kernel: um: Fix out-of-bounds read in LDT setup", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49395.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49395.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49395", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07696", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0774", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16838", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16817", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16774", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16715", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16651", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16658", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16697", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.166", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16589", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16554", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1642", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1654", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16698", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16784", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-49395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49395" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347899", "reference_id": "2347899", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347899" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10179", "reference_id": "RHSA-2025:10179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10211", "reference_id": "RHSA-2025:10211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10527", "reference_id": "RHSA-2025:10527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10828", "reference_id": "RHSA-2025:10828", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10829", "reference_id": "RHSA-2025:10829", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10829" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10830", "reference_id": "RHSA-2025:10830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11045", "reference_id": "RHSA-2025:11045", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11045" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11570", "reference_id": "RHSA-2025:11570", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11570" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13135", "reference_id": "RHSA-2025:13135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8743", "reference_id": "RHSA-2025:8743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8744", "reference_id": "RHSA-2025:8744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8744" } ], "fixed_packages": [], "aliases": [ "CVE-2022-49395" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tawg-cw1b-4fc6" } ], "fixing_vulnerabilities": [], "risk_score": "3.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-305.162.1%3Farch=el8_4" }