{"url":"http://public2.vulnerablecode.io/api/packages/93051?format=json","purl":"pkg:rpm/redhat/kernel-rt@5.14.0-284.11.1.rt14.296?arch=el9_2","type":"rpm","namespace":"redhat","name":"kernel-rt","version":"5.14.0-284.11.1.rt14.296","qualifiers":{"arch":"el9_2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78921?format=json","vulnerability_id":"VCID-1b2u-7w7f-wudv","summary":"kernel: use-after-free due to race condition in qdisc_graft()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0590.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0590.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0590","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01789","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01801","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01804","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02665","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02668","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02801","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02775","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02646","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02766","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02756","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02744","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05764","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165741","reference_id":"2165741","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5627","reference_id":"RHSA-2023:5627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7382","reference_id":"RHSA-2023:7382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7389","reference_id":"RHSA-2023:7389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7389"},{"reference_url":"https://usn.ubuntu.com/5850-1/","reference_id":"USN-5850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5850-1/"},{"reference_url":"https://usn.ubuntu.com/5851-1/","reference_id":"USN-5851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5851-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5876-1/","reference_id":"USN-5876-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5876-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5878-1/","reference_id":"USN-5878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5878-1/"},{"reference_url":"https://usn.ubuntu.com/5879-1/","reference_id":"USN-5879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5879-1/"},{"reference_url":"https://usn.ubuntu.com/6284-1/","reference_id":"USN-6284-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6284-1/"},{"reference_url":"https://usn.ubuntu.com/6301-1/","reference_id":"USN-6301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6301-1/"},{"reference_url":"https://usn.ubuntu.com/6312-1/","reference_id":"USN-6312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6312-1/"},{"reference_url":"https://usn.ubuntu.com/6314-1/","reference_id":"USN-6314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6314-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6337-1/","reference_id":"USN-6337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6337-1/"}],"fixed_packages":[],"aliases":["CVE-2023-0590"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1b2u-7w7f-wudv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78950?format=json","vulnerability_id":"VCID-1jsv-f7pv-4bbc","summary":"kernel: use-after-free in bss_ref_get in net/wireless/scan.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42720.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42720.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42720","reference_id":"","reference_type":"","scores":[{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69509","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69493","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69502","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69451","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69535","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.7078","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70805","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70884","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70878","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70833","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70848","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70863","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70841","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70824","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70787","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134451","reference_id":"2134451","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134451"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/10/13/5","reference_id":"5","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/10/13/5"},{"reference_url":"https://security.archlinux.org/ASA-202210-1","reference_id":"ASA-202210-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-1"},{"reference_url":"https://security.archlinux.org/ASA-202210-2","reference_id":"ASA-202210-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-2"},{"reference_url":"https://security.archlinux.org/ASA-202210-3","reference_id":"ASA-202210-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-3"},{"reference_url":"https://security.archlinux.org/ASA-202210-4","reference_id":"ASA-202210-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-4"},{"reference_url":"https://security.archlinux.org/AVG-2800","reference_id":"AVG-2800","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2800"},{"reference_url":"https://security.archlinux.org/AVG-2801","reference_id":"AVG-2801","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2801"},{"reference_url":"https://security.archlinux.org/AVG-2802","reference_id":"AVG-2802","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2802"},{"reference_url":"https://security.archlinux.org/AVG-2803","reference_id":"AVG-2803","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2803"},{"reference_url":"https://www.debian.org/security/2022/dsa-5257","reference_id":"dsa-5257","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://www.debian.org/security/2022/dsa-5257"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/","reference_id":"GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f","reference_id":"?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f"},{"reference_url":"http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0090-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html","reference_id":"msg00001.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230203-0008/","reference_id":"ntap-20230203-0008","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230203-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/","reference_id":"S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1204059","reference_id":"show_bug.cgi?id=1204059","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1204059"},{"reference_url":"https://usn.ubuntu.com/5691-1/","reference_id":"USN-5691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5691-1/"},{"reference_url":"https://usn.ubuntu.com/5692-1/","reference_id":"USN-5692-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5692-1/"},{"reference_url":"https://usn.ubuntu.com/5693-1/","reference_id":"USN-5693-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5693-1/"},{"reference_url":"https://usn.ubuntu.com/5700-1/","reference_id":"USN-5700-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5700-1/"},{"reference_url":"https://usn.ubuntu.com/5708-1/","reference_id":"USN-5708-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5708-1/"},{"reference_url":"https://usn.ubuntu.com/5752-1/","reference_id":"USN-5752-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5752-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/","reference_id":"VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/"}],"fixed_packages":[],"aliases":["CVE-2022-42720"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1jsv-f7pv-4bbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78893?format=json","vulnerability_id":"VCID-4nqf-ct5y-6uev","summary":"kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42896","reference_id":"","reference_type":"","scores":[{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61955","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62004","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61973","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62015","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62021","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62003","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.6201","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61916","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61946","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61966","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61983","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42896"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2147364","reference_id":"2147364","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2147364"},{"reference_url":"https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4","reference_id":"#711f8c3fb3db61897080468586b970c87c61d9e4","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/"}],"url":"https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4"},{"reference_url":"https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4","reference_id":"711f8c3fb3db61897080468586b970c87c61d9e4","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/"}],"url":"https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3461","reference_id":"RHSA-2023:3461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3462","reference_id":"RHSA-2023:3462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3517","reference_id":"RHSA-2023:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4137","reference_id":"RHSA-2023:4137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4138","reference_id":"RHSA-2023:4138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4230","reference_id":"RHSA-2023:4230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4517","reference_id":"RHSA-2023:4517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4531","reference_id":"RHSA-2023:4531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4541","reference_id":"RHSA-2023:4541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4789","reference_id":"RHSA-2023:4789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4888","reference_id":"RHSA-2023:4888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5580","reference_id":"RHSA-2023:5580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5588","reference_id":"RHSA-2023:5588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5589","reference_id":"RHSA-2023:5589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0980","reference_id":"RHSA-2024:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1249","reference_id":"RHSA-2024:1249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1323","reference_id":"RHSA-2024:1323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1332","reference_id":"RHSA-2024:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1746","reference_id":"RHSA-2024:1746","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1746"},{"reference_url":"https://usn.ubuntu.com/5780-1/","reference_id":"USN-5780-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5780-1/"},{"reference_url":"https://usn.ubuntu.com/5783-1/","reference_id":"USN-5783-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5783-1/"},{"reference_url":"https://usn.ubuntu.com/5794-1/","reference_id":"USN-5794-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5794-1/"},{"reference_url":"https://usn.ubuntu.com/5802-1/","reference_id":"USN-5802-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5802-1/"},{"reference_url":"https://usn.ubuntu.com/5803-1/","reference_id":"USN-5803-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5803-1/"},{"reference_url":"https://usn.ubuntu.com/5804-1/","reference_id":"USN-5804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5804-1/"},{"reference_url":"https://usn.ubuntu.com/5804-2/","reference_id":"USN-5804-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5804-2/"},{"reference_url":"https://usn.ubuntu.com/5808-1/","reference_id":"USN-5808-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5808-1/"},{"reference_url":"https://usn.ubuntu.com/5809-1/","reference_id":"USN-5809-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5809-1/"},{"reference_url":"https://usn.ubuntu.com/5813-1/","reference_id":"USN-5813-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5813-1/"},{"reference_url":"https://usn.ubuntu.com/5814-1/","reference_id":"USN-5814-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5814-1/"},{"reference_url":"https://usn.ubuntu.com/5829-1/","reference_id":"USN-5829-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5829-1/"},{"reference_url":"https://usn.ubuntu.com/5830-1/","reference_id":"USN-5830-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5830-1/"},{"reference_url":"https://usn.ubuntu.com/5831-1/","reference_id":"USN-5831-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5831-1/"},{"reference_url":"https://usn.ubuntu.com/5832-1/","reference_id":"USN-5832-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5832-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5861-1/","reference_id":"USN-5861-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5861-1/"},{"reference_url":"https://usn.ubuntu.com/5863-1/","reference_id":"USN-5863-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5863-1/"},{"reference_url":"https://usn.ubuntu.com/5875-1/","reference_id":"USN-5875-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5875-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5879-1/","reference_id":"USN-5879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5879-1/"},{"reference_url":"https://usn.ubuntu.com/5914-1/","reference_id":"USN-5914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5914-1/"},{"reference_url":"https://usn.ubuntu.com/5918-1/","reference_id":"USN-5918-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5918-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42896"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4nqf-ct5y-6uev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79284?format=json","vulnerability_id":"VCID-58sv-d9e3-rfbf","summary":"kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33655.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33655.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33655","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06243","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06641","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06455","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0647","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06492","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06504","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06513","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06291","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06378","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06371","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06355","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06293","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06306","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108691","reference_id":"2108691","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108691"},{"reference_url":"https://security.archlinux.org/AVG-2772","reference_id":"AVG-2772","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2772"},{"reference_url":"https://security.archlinux.org/AVG-2773","reference_id":"AVG-2773","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2773"},{"reference_url":"https://security.archlinux.org/AVG-2774","reference_id":"AVG-2774","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2774"},{"reference_url":"https://security.archlinux.org/AVG-2775","reference_id":"AVG-2775","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://usn.ubuntu.com/5577-1/","reference_id":"USN-5577-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5577-1/"},{"reference_url":"https://usn.ubuntu.com/5580-1/","reference_id":"USN-5580-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5580-1/"},{"reference_url":"https://usn.ubuntu.com/5596-1/","reference_id":"USN-5596-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5596-1/"},{"reference_url":"https://usn.ubuntu.com/5621-1/","reference_id":"USN-5621-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5621-1/"},{"reference_url":"https://usn.ubuntu.com/5622-1/","reference_id":"USN-5622-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5622-1/"},{"reference_url":"https://usn.ubuntu.com/5623-1/","reference_id":"USN-5623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5623-1/"},{"reference_url":"https://usn.ubuntu.com/5624-1/","reference_id":"USN-5624-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5624-1/"},{"reference_url":"https://usn.ubuntu.com/5630-1/","reference_id":"USN-5630-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5630-1/"},{"reference_url":"https://usn.ubuntu.com/5633-1/","reference_id":"USN-5633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5633-1/"},{"reference_url":"https://usn.ubuntu.com/5635-1/","reference_id":"USN-5635-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5635-1/"},{"reference_url":"https://usn.ubuntu.com/5639-1/","reference_id":"USN-5639-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5639-1/"},{"reference_url":"https://usn.ubuntu.com/5640-1/","reference_id":"USN-5640-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5640-1/"},{"reference_url":"https://usn.ubuntu.com/5644-1/","reference_id":"USN-5644-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5644-1/"},{"reference_url":"https://usn.ubuntu.com/5647-1/","reference_id":"USN-5647-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5647-1/"},{"reference_url":"https://usn.ubuntu.com/5648-1/","reference_id":"USN-5648-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5648-1/"},{"reference_url":"https://usn.ubuntu.com/5650-1/","reference_id":"USN-5650-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5650-1/"},{"reference_url":"https://usn.ubuntu.com/5652-1/","reference_id":"USN-5652-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5652-1/"},{"reference_url":"https://usn.ubuntu.com/5654-1/","reference_id":"USN-5654-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5654-1/"},{"reference_url":"https://usn.ubuntu.com/5655-1/","reference_id":"USN-5655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5655-1/"},{"reference_url":"https://usn.ubuntu.com/5660-1/","reference_id":"USN-5660-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5660-1/"},{"reference_url":"https://usn.ubuntu.com/5683-1/","reference_id":"USN-5683-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5683-1/"}],"fixed_packages":[],"aliases":["CVE-2021-33655"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-58sv-d9e3-rfbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79448?format=json","vulnerability_id":"VCID-5we4-cmum-y7dm","summary":"kernel: use-after-free in free_pipe_info() could lead to privilege escalation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1882.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1882.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1882","reference_id":"","reference_type":"","scores":[{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08685","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08714","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08687","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08763","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08789","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.0879","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08743","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08631","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.0862","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11105","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11234","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11647","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11532","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11687","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1882"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2089701","reference_id":"2089701","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2089701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://usn.ubuntu.com/5667-1/","reference_id":"USN-5667-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5667-1/"},{"reference_url":"https://usn.ubuntu.com/5683-1/","reference_id":"USN-5683-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5683-1/"},{"reference_url":"https://usn.ubuntu.com/5703-1/","reference_id":"USN-5703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5703-1/"}],"fixed_packages":[],"aliases":["CVE-2022-1882"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5we4-cmum-y7dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79280?format=json","vulnerability_id":"VCID-63j6-wgqx-vfg5","summary":"kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4128.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4128.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4128","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14778","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14616","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14638","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1467","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14668","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14604","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14482","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14856","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14659","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1475","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1481","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14768","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14675","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1457","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4128"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/netdev/20220708233610.410786-2-mathew.j.martineau%40linux.intel.com/","reference_id":"20220708233610.410786-2-mathew.j.martineau%40linux.intel.com","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:18:39Z/"}],"url":"https://lore.kernel.org/netdev/20220708233610.410786-2-mathew.j.martineau%40linux.intel.com/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134380","reference_id":"2134380","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134380"},{"reference_url":"https://github.com/torvalds/linux/commit/5c835bb142d4","reference_id":"5c835bb142d4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:18:39Z/"}],"url":"https://github.com/torvalds/linux/commit/5c835bb142d4"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"}],"fixed_packages":[],"aliases":["CVE-2022-4128"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-63j6-wgqx-vfg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78951?format=json","vulnerability_id":"VCID-648j-njzx-rkcf","summary":"kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42721.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42721","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06204","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06196","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06223","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06165","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06151","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06332","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06568","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06584","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06557","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06564","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06645","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06653","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06661","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06618","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06547","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134506","reference_id":"2134506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134506"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/10/13/5","reference_id":"5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/10/13/5"},{"reference_url":"https://security.archlinux.org/ASA-202210-1","reference_id":"ASA-202210-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-1"},{"reference_url":"https://security.archlinux.org/ASA-202210-2","reference_id":"ASA-202210-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-2"},{"reference_url":"https://security.archlinux.org/ASA-202210-3","reference_id":"ASA-202210-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-3"},{"reference_url":"https://security.archlinux.org/ASA-202210-4","reference_id":"ASA-202210-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-4"},{"reference_url":"https://security.archlinux.org/AVG-2800","reference_id":"AVG-2800","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2800"},{"reference_url":"https://security.archlinux.org/AVG-2801","reference_id":"AVG-2801","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2801"},{"reference_url":"https://security.archlinux.org/AVG-2802","reference_id":"AVG-2802","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2802"},{"reference_url":"https://security.archlinux.org/AVG-2803","reference_id":"AVG-2803","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2803"},{"reference_url":"https://www.debian.org/security/2022/dsa-5257","reference_id":"dsa-5257","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://www.debian.org/security/2022/dsa-5257"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/","reference_id":"GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=bcca852027e5878aec911a347407ecc88d6fff7f","reference_id":"?id=bcca852027e5878aec911a347407ecc88d6fff7f","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=bcca852027e5878aec911a347407ecc88d6fff7f"},{"reference_url":"http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0090-1.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html","reference_id":"msg00001.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230203-0008/","reference_id":"ntap-20230203-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230203-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/","reference_id":"S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1204060","reference_id":"show_bug.cgi?id=1204060","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1204060"},{"reference_url":"https://usn.ubuntu.com/5691-1/","reference_id":"USN-5691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5691-1/"},{"reference_url":"https://usn.ubuntu.com/5692-1/","reference_id":"USN-5692-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5692-1/"},{"reference_url":"https://usn.ubuntu.com/5693-1/","reference_id":"USN-5693-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5693-1/"},{"reference_url":"https://usn.ubuntu.com/5700-1/","reference_id":"USN-5700-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5700-1/"},{"reference_url":"https://usn.ubuntu.com/5708-1/","reference_id":"USN-5708-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5708-1/"},{"reference_url":"https://usn.ubuntu.com/5752-1/","reference_id":"USN-5752-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5752-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/","reference_id":"VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/"}],"fixed_packages":[],"aliases":["CVE-2022-42721"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-648j-njzx-rkcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78981?format=json","vulnerability_id":"VCID-6jc4-7c8b-4bhv","summary":"kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1195.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1195.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1195","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04221","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04263","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04245","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04093","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04113","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04132","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04116","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04102","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04076","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04069","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0419","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04202","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1195"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621","reference_id":"153695d36ead0ccc4d0256953c751cabf673e621","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:57Z/"}],"url":"https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154171","reference_id":"2154171","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0431","reference_id":"RHSA-2024:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0432","reference_id":"RHSA-2024:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0432"},{"reference_url":"https://usn.ubuntu.com/5970-1/","reference_id":"USN-5970-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5970-1/"},{"reference_url":"https://usn.ubuntu.com/5979-1/","reference_id":"USN-5979-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5979-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1195"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6jc4-7c8b-4bhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79406?format=json","vulnerability_id":"VCID-8ekj-2sge-5kd2","summary":"kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1789.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1789.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1789","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04217","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04508","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04271","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04397","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04437","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04478","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04255","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04275","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04287","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04319","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04334","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04326","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04312","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04291","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04262","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090723","reference_id":"2090723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090723"},{"reference_url":"https://security.archlinux.org/AVG-2772","reference_id":"AVG-2772","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2772"},{"reference_url":"https://security.archlinux.org/AVG-2773","reference_id":"AVG-2773","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2773"},{"reference_url":"https://security.archlinux.org/AVG-2774","reference_id":"AVG-2774","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2774"},{"reference_url":"https://security.archlinux.org/AVG-2775","reference_id":"AVG-2775","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4447","reference_id":"RHSA-2024:4447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4447"},{"reference_url":"https://usn.ubuntu.com/5514-1/","reference_id":"USN-5514-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5514-1/"},{"reference_url":"https://usn.ubuntu.com/5518-1/","reference_id":"USN-5518-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5518-1/"},{"reference_url":"https://usn.ubuntu.com/5529-1/","reference_id":"USN-5529-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5529-1/"},{"reference_url":"https://usn.ubuntu.com/5539-1/","reference_id":"USN-5539-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5539-1/"},{"reference_url":"https://usn.ubuntu.com/5564-1/","reference_id":"USN-5564-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5564-1/"}],"fixed_packages":[],"aliases":["CVE-2022-1789"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8ekj-2sge-5kd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4321?format=json","vulnerability_id":"VCID-8htb-kgr8-3yes","summary":"network backend may cause Linux netfront to use freed SKBs","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33743.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33743.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33743","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07575","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07618","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07591","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0765","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07668","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07669","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07655","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0764","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07566","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07554","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07694","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07644","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10925","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10915","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10848","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10791","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107924","reference_id":"2107924","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107924"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://usn.ubuntu.com/5623-1/","reference_id":"USN-5623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5623-1/"},{"reference_url":"https://usn.ubuntu.com/5624-1/","reference_id":"USN-5624-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5624-1/"},{"reference_url":"https://usn.ubuntu.com/5633-1/","reference_id":"USN-5633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5633-1/"},{"reference_url":"https://usn.ubuntu.com/5635-1/","reference_id":"USN-5635-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5635-1/"},{"reference_url":"https://usn.ubuntu.com/5640-1/","reference_id":"USN-5640-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5640-1/"},{"reference_url":"https://usn.ubuntu.com/5644-1/","reference_id":"USN-5644-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5644-1/"},{"reference_url":"https://usn.ubuntu.com/5648-1/","reference_id":"USN-5648-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5648-1/"},{"reference_url":"https://usn.ubuntu.com/5655-1/","reference_id":"USN-5655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5655-1/"},{"reference_url":"https://usn.ubuntu.com/5683-1/","reference_id":"USN-5683-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5683-1/"},{"reference_url":"https://usn.ubuntu.com/5773-1/","reference_id":"USN-5773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5773-1/"},{"reference_url":"https://usn.ubuntu.com/5789-1/","reference_id":"USN-5789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5789-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-405.html","reference_id":"XSA-405","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-405.html"}],"fixed_packages":[],"aliases":["CVE-2022-33743","XSA-405"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8htb-kgr8-3yes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78958?format=json","vulnerability_id":"VCID-9nyv-n5f5-ekbf","summary":"kernel: memory leak in ipv6_renew_options()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3524.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3524.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3524","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19049","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18929","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18819","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18799","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18754","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18634","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19192","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18909","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18988","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19042","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18951","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18905","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18918","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26165","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150947","reference_id":"2150947","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150947"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5754-1/","reference_id":"USN-5754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-1/"},{"reference_url":"https://usn.ubuntu.com/5754-2/","reference_id":"USN-5754-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-2/"},{"reference_url":"https://usn.ubuntu.com/5755-1/","reference_id":"USN-5755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-1/"},{"reference_url":"https://usn.ubuntu.com/5755-2/","reference_id":"USN-5755-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-2/"},{"reference_url":"https://usn.ubuntu.com/5756-1/","reference_id":"USN-5756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-1/"},{"reference_url":"https://usn.ubuntu.com/5756-2/","reference_id":"USN-5756-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-2/"},{"reference_url":"https://usn.ubuntu.com/5756-3/","reference_id":"USN-5756-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-3/"},{"reference_url":"https://usn.ubuntu.com/5757-1/","reference_id":"USN-5757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-1/"},{"reference_url":"https://usn.ubuntu.com/5757-2/","reference_id":"USN-5757-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-2/"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5773-1/","reference_id":"USN-5773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5773-1/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"},{"reference_url":"https://usn.ubuntu.com/5779-1/","reference_id":"USN-5779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5779-1/"},{"reference_url":"https://usn.ubuntu.com/5780-1/","reference_id":"USN-5780-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5780-1/"},{"reference_url":"https://usn.ubuntu.com/5789-1/","reference_id":"USN-5789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5789-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3524"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9nyv-n5f5-ekbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79208?format=json","vulnerability_id":"VCID-9pmb-g7fz-3kd6","summary":"kernel: lockdown bypass using IMA","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21505.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21505.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21505","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14014","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13966","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1388","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13786","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13782","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13856","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13882","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13854","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1377","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14068","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13873","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13957","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1401","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13929","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15806","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15917","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106830","reference_id":"2106830","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106830"},{"reference_url":"https://git.kernel.org/linus/543ce63b664e2c2f9533d089a4664b559c3e6b5b","reference_id":"543ce63b664e2c2f9533d089a4664b559c3e6b5b","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-27T16:51:57Z/"}],"url":"https://git.kernel.org/linus/543ce63b664e2c2f9533d089a4664b559c3e6b5b"},{"reference_url":"https://linux.oracle.com/cve/CVE-2022-21505.html","reference_id":"CVE-2022-21505.html","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-27T16:51:57Z/"}],"url":"https://linux.oracle.com/cve/CVE-2022-21505.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://usn.ubuntu.com/6031-1/","reference_id":"USN-6031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6031-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21505"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9pmb-g7fz-3kd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80174?format=json","vulnerability_id":"VCID-bpkg-a38v-53dv","summary":"kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20141.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20141.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-20141","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05773","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05806","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05842","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05836","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05882","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05873","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06066","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06087","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05865","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0583","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05841","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05995","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06026","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06062","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08381","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-20141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20141"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2114937","reference_id":"2114937","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2114937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5540-1/","reference_id":"USN-5540-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5540-1/"}],"fixed_packages":[],"aliases":["CVE-2022-20141"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bpkg-a38v-53dv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79345?format=json","vulnerability_id":"VCID-c3z5-1arv-kqck","summary":"kernel: ext4: use-after-free in ext4_xattr_set_entry()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2513.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2513.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2513","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02134","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02118","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02093","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02106","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02193","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02163","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02154","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02146","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02142","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02137","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02122","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2513"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/","reference_id":"20220616021358.2504451-1-libaokun1%40huawei.com","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/"}],"url":"https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193097","reference_id":"2193097","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193097"},{"reference_url":"https://github.com/torvalds/linux/commit/67d7d8ad99be","reference_id":"67d7d8ad99be","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/"}],"url":"https://github.com/torvalds/linux/commit/67d7d8ad99be"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15649","reference_id":"RHSA-2025:15649","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15649"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15656","reference_id":"RHSA-2025:15656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15658","reference_id":"RHSA-2025:15658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15660","reference_id":"RHSA-2025:15660","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15660"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15670","reference_id":"RHSA-2025:15670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15670"},{"reference_url":"https://usn.ubuntu.com/6254-1/","reference_id":"USN-6254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6254-1/"}],"fixed_packages":[],"aliases":["CVE-2023-2513"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c3z5-1arv-kqck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78963?format=json","vulnerability_id":"VCID-chuj-redw-v3ek","summary":"kernel: out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3435.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3435.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3435","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21368","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21893","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22288","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22153","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22208","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22228","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22187","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22127","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22075","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21935","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21923","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2191","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21819","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3435"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133490","reference_id":"2133490","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133490"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/","reference_id":"GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:10:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/"},{"reference_url":"https://vuldb.com/?id.210357","reference_id":"?id.210357","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:10:02Z/"}],"url":"https://vuldb.com/?id.210357"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:10:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/","reference_id":"S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:10:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/"},{"reference_url":"https://lore.kernel.org/netdev/20221005181257.8897-1-dsahern%40kernel.org/T/#u","reference_id":"#u","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:10:02Z/"}],"url":"https://lore.kernel.org/netdev/20221005181257.8897-1-dsahern%40kernel.org/T/#u"},{"reference_url":"https://usn.ubuntu.com/5911-1/","reference_id":"USN-5911-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5911-1/"},{"reference_url":"https://usn.ubuntu.com/5912-1/","reference_id":"USN-5912-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5912-1/"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5929-1/","reference_id":"USN-5929-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5929-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5935-1/","reference_id":"USN-5935-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5935-1/"},{"reference_url":"https://usn.ubuntu.com/5938-1/","reference_id":"USN-5938-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5938-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5941-1/","reference_id":"USN-5941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5941-1/"},{"reference_url":"https://usn.ubuntu.com/5950-1/","reference_id":"USN-5950-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5950-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/5962-1/","reference_id":"USN-5962-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5962-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/","reference_id":"VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:10:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/"}],"fixed_packages":[],"aliases":["CVE-2022-3435"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-chuj-redw-v3ek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78970?format=json","vulnerability_id":"VCID-ckqp-r5m2-j3fx","summary":"kernel: data races around sk->sk_prot","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3567.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3567.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3567","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06443","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06395","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06487","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06481","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06475","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06463","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.064","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0641","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06833","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06819","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06795","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06659","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06986","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06615","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06792","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.068","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143943","reference_id":"2143943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143943"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://vuldb.com/?id.211090","reference_id":"?id.211090","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:29Z/"}],"url":"https://vuldb.com/?id.211090"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6","reference_id":"?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:29Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5754-1/","reference_id":"USN-5754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-1/"},{"reference_url":"https://usn.ubuntu.com/5754-2/","reference_id":"USN-5754-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-2/"},{"reference_url":"https://usn.ubuntu.com/5755-1/","reference_id":"USN-5755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-1/"},{"reference_url":"https://usn.ubuntu.com/5755-2/","reference_id":"USN-5755-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-2/"},{"reference_url":"https://usn.ubuntu.com/5756-1/","reference_id":"USN-5756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-1/"},{"reference_url":"https://usn.ubuntu.com/5756-2/","reference_id":"USN-5756-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-2/"},{"reference_url":"https://usn.ubuntu.com/5756-3/","reference_id":"USN-5756-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-3/"},{"reference_url":"https://usn.ubuntu.com/5757-1/","reference_id":"USN-5757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-1/"},{"reference_url":"https://usn.ubuntu.com/5757-2/","reference_id":"USN-5757-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-2/"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5773-1/","reference_id":"USN-5773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5773-1/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"},{"reference_url":"https://usn.ubuntu.com/5779-1/","reference_id":"USN-5779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5779-1/"},{"reference_url":"https://usn.ubuntu.com/5789-1/","reference_id":"USN-5789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5789-1/"},{"reference_url":"https://usn.ubuntu.com/5914-1/","reference_id":"USN-5914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5914-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3567"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ckqp-r5m2-j3fx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78917?format=json","vulnerability_id":"VCID-d14e-jv1a-w7d3","summary":"kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3619.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3619","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07672","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07597","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07521","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0751","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07649","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07596","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0754","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07528","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0753","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0757","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07547","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07606","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07625","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07611","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3619"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154235","reference_id":"2154235","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154235"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://vuldb.com/?id.211918","reference_id":"?id.211918","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:20Z/"}],"url":"https://vuldb.com/?id.211918"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193","reference_id":"?id=97097c85c088e11651146da32a4e1cdb9dfa6193","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:20Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5780-1/","reference_id":"USN-5780-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5780-1/"},{"reference_url":"https://usn.ubuntu.com/5850-1/","reference_id":"USN-5850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5850-1/"},{"reference_url":"https://usn.ubuntu.com/5851-1/","reference_id":"USN-5851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5851-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5876-1/","reference_id":"USN-5876-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5876-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5878-1/","reference_id":"USN-5878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5878-1/"},{"reference_url":"https://usn.ubuntu.com/5879-1/","reference_id":"USN-5879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5879-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3619"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d14e-jv1a-w7d3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78962?format=json","vulnerability_id":"VCID-dqhd-grev-t3ge","summary":"kernel: use-after-free related to leaf anon_vma double reuse","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42703","reference_id":"","reference_type":"","scores":[{"value":"0.0088","scoring_system":"epss","scoring_elements":"0.75473","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76906","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76907","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76773","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76783","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76824","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76833","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76827","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76875","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76866","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133483","reference_id":"2133483","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133483"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1091","reference_id":"RHSA-2023:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1092","reference_id":"RHSA-2023:1092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3388","reference_id":"RHSA-2023:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4137","reference_id":"RHSA-2023:4137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4138","reference_id":"RHSA-2023:4138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4138"},{"reference_url":"https://usn.ubuntu.com/5728-1/","reference_id":"USN-5728-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-1/"},{"reference_url":"https://usn.ubuntu.com/5728-2/","reference_id":"USN-5728-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-2/"},{"reference_url":"https://usn.ubuntu.com/5728-3/","reference_id":"USN-5728-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-3/"},{"reference_url":"https://usn.ubuntu.com/5755-1/","reference_id":"USN-5755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-1/"},{"reference_url":"https://usn.ubuntu.com/5755-2/","reference_id":"USN-5755-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-2/"},{"reference_url":"https://usn.ubuntu.com/5756-1/","reference_id":"USN-5756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-1/"},{"reference_url":"https://usn.ubuntu.com/5756-2/","reference_id":"USN-5756-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-2/"},{"reference_url":"https://usn.ubuntu.com/5756-3/","reference_id":"USN-5756-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-3/"},{"reference_url":"https://usn.ubuntu.com/5757-1/","reference_id":"USN-5757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-1/"},{"reference_url":"https://usn.ubuntu.com/5757-2/","reference_id":"USN-5757-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-2/"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5773-1/","reference_id":"USN-5773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5773-1/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"},{"reference_url":"https://usn.ubuntu.com/5779-1/","reference_id":"USN-5779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5779-1/"},{"reference_url":"https://usn.ubuntu.com/5789-1/","reference_id":"USN-5789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5789-1/"},{"reference_url":"https://usn.ubuntu.com/5916-1/","reference_id":"USN-5916-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5916-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42703"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqhd-grev-t3ge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78968?format=json","vulnerability_id":"VCID-dqth-c54y-e7fb","summary":"kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3566.json","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3566.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3566","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06912","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06857","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06943","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06942","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06934","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06869","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06853","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07143","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07169","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07127","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07111","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07298","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07055","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07191","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07161","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3566"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143893","reference_id":"2143893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143893"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://vuldb.com/?id.211089","reference_id":"?id.211089","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:33Z/"}],"url":"https://vuldb.com/?id.211089"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57","reference_id":"?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:33Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5754-1/","reference_id":"USN-5754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-1/"},{"reference_url":"https://usn.ubuntu.com/5754-2/","reference_id":"USN-5754-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5754-2/"},{"reference_url":"https://usn.ubuntu.com/5755-1/","reference_id":"USN-5755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-1/"},{"reference_url":"https://usn.ubuntu.com/5755-2/","reference_id":"USN-5755-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5755-2/"},{"reference_url":"https://usn.ubuntu.com/5756-1/","reference_id":"USN-5756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-1/"},{"reference_url":"https://usn.ubuntu.com/5756-2/","reference_id":"USN-5756-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-2/"},{"reference_url":"https://usn.ubuntu.com/5756-3/","reference_id":"USN-5756-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5756-3/"},{"reference_url":"https://usn.ubuntu.com/5757-1/","reference_id":"USN-5757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-1/"},{"reference_url":"https://usn.ubuntu.com/5757-2/","reference_id":"USN-5757-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5757-2/"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5773-1/","reference_id":"USN-5773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5773-1/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"},{"reference_url":"https://usn.ubuntu.com/5779-1/","reference_id":"USN-5779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5779-1/"},{"reference_url":"https://usn.ubuntu.com/5789-1/","reference_id":"USN-5789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5789-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3566"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqth-c54y-e7fb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79188?format=json","vulnerability_id":"VCID-ejj4-yt8j-c7fm","summary":"kernel: race condition in xfrm_probe_algs can lead to OOB read/write","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3028.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3028","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01259","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01265","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0127","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01263","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.017","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02077","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02084","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02078","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02098","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02075","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0206","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02056","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02032","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02045","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122228","reference_id":"2122228","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122228"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5650-1/","reference_id":"USN-5650-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5650-1/"},{"reference_url":"https://usn.ubuntu.com/5693-1/","reference_id":"USN-5693-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5693-1/"},{"reference_url":"https://usn.ubuntu.com/5727-1/","reference_id":"USN-5727-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5727-1/"},{"reference_url":"https://usn.ubuntu.com/5727-2/","reference_id":"USN-5727-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5727-2/"},{"reference_url":"https://usn.ubuntu.com/5728-1/","reference_id":"USN-5728-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-1/"},{"reference_url":"https://usn.ubuntu.com/5728-2/","reference_id":"USN-5728-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-2/"},{"reference_url":"https://usn.ubuntu.com/5728-3/","reference_id":"USN-5728-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-3/"},{"reference_url":"https://usn.ubuntu.com/5729-1/","reference_id":"USN-5729-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5729-1/"},{"reference_url":"https://usn.ubuntu.com/5729-2/","reference_id":"USN-5729-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5729-2/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3028"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ejj4-yt8j-c7fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79602?format=json","vulnerability_id":"VCID-ezb4-x5pv-myhe","summary":"hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26341.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26341.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26341","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15515","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15626","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15425","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15513","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15563","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15526","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15489","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15422","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15343","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15348","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15399","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15444","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15442","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15204","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15332","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26341"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061703","reference_id":"2061703","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1877","reference_id":"RHSA-2024:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1877"}],"fixed_packages":[],"aliases":["CVE-2021-26341"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ezb4-x5pv-myhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79008?format=json","vulnerability_id":"VCID-g2k9-eds7-6qe3","summary":"kernel: memory corruption in usbmon driver","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43750.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43750.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43750","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19108","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19101","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19091","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19133","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19187","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21309","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21084","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21406","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21158","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21138","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2114","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21116","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21016","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151270","reference_id":"2151270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151270"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1987","reference_id":"RHSA-2023:1987","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1987"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1988","reference_id":"RHSA-2023:1988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5758-1/","reference_id":"USN-5758-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5758-1/"},{"reference_url":"https://usn.ubuntu.com/5791-1/","reference_id":"USN-5791-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-1/"},{"reference_url":"https://usn.ubuntu.com/5791-2/","reference_id":"USN-5791-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-2/"},{"reference_url":"https://usn.ubuntu.com/5791-3/","reference_id":"USN-5791-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-3/"},{"reference_url":"https://usn.ubuntu.com/5792-1/","reference_id":"USN-5792-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5792-1/"},{"reference_url":"https://usn.ubuntu.com/5792-2/","reference_id":"USN-5792-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5792-2/"},{"reference_url":"https://usn.ubuntu.com/5793-1/","reference_id":"USN-5793-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-1/"},{"reference_url":"https://usn.ubuntu.com/5793-2/","reference_id":"USN-5793-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-2/"},{"reference_url":"https://usn.ubuntu.com/5793-3/","reference_id":"USN-5793-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-3/"},{"reference_url":"https://usn.ubuntu.com/5793-4/","reference_id":"USN-5793-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-4/"},{"reference_url":"https://usn.ubuntu.com/5815-1/","reference_id":"USN-5815-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5815-1/"},{"reference_url":"https://usn.ubuntu.com/5854-1/","reference_id":"USN-5854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5854-1/"},{"reference_url":"https://usn.ubuntu.com/5861-1/","reference_id":"USN-5861-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5861-1/"},{"reference_url":"https://usn.ubuntu.com/5862-1/","reference_id":"USN-5862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5862-1/"},{"reference_url":"https://usn.ubuntu.com/5865-1/","reference_id":"USN-5865-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5865-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5913-1/","reference_id":"USN-5913-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5913-1/"},{"reference_url":"https://usn.ubuntu.com/5919-1/","reference_id":"USN-5919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5919-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"}],"fixed_packages":[],"aliases":["CVE-2022-43750"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g2k9-eds7-6qe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78863?format=json","vulnerability_id":"VCID-ghef-adjn-rqcb","summary":"kernel: denial of service in tipc_conn_close","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1382.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1382.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1382","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01073","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01096","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01095","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01079","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01074","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01068","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01077","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03381","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03426","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03382","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0339","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03379","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04729","published_at":"2026-05-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00895","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00893","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177371","reference_id":"2177371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177371"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u","reference_id":"#u","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:20Z/"}],"url":"https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6739-1/","reference_id":"USN-6739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6739-1/"},{"reference_url":"https://usn.ubuntu.com/6740-1/","reference_id":"USN-6740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6740-1/"}],"fixed_packages":[],"aliases":["CVE-2023-1382"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ghef-adjn-rqcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76479?format=json","vulnerability_id":"VCID-guqa-19j6-bba4","summary":"kernel: scsi: mpt3sas: Fix use-after-free warning","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48695.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48695","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04861","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04654","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04636","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04594","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04732","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04769","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04804","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04824","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04602","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04609","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04659","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278999","reference_id":"2278999","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278999"},{"reference_url":"https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b","reference_id":"41acb064c4e013808bc7d5fc1b506fa449425b0b","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b"},{"reference_url":"https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5","reference_id":"5682c94644fde72f72bded6580c38189ffc856b5","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5"},{"reference_url":"https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7","reference_id":"6229fa494a5949be209bc73afbc5d0a749c2e3c7","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7"},{"reference_url":"https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16","reference_id":"82efb917eeb27454dc4c6fe26432fc8f6c75bc16","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16"},{"reference_url":"https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34","reference_id":"991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34"},{"reference_url":"https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82","reference_id":"b8fc9e91b931215110ba824d1a2983c5f60b6f82","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82"},{"reference_url":"https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6","reference_id":"d4959d09b76eb7a4146f5133962b88d3bddb63d6","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6"},{"reference_url":"https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057","reference_id":"ea10a652ad2ae2cf3eced6f632a5c98f26727057","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/"}],"url":"https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9500","reference_id":"RHSA-2024:9500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9500"}],"fixed_packages":[],"aliases":["CVE-2022-48695"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-guqa-19j6-bba4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79396?format=json","vulnerability_id":"VCID-h82m-mnhk-67e2","summary":"kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39189.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39189.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39189","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0551","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05509","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05428","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05277","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05276","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05328","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05338","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05382","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05358","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05325","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05823","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2124788","reference_id":"2124788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2124788"},{"reference_url":"https://github.com/torvalds/linux/commit/6cd88243c7e03845a450795e134b488fc2afb736","reference_id":"6cd88243c7e03845a450795e134b488fc2afb736","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/"}],"url":"https://github.com/torvalds/linux/commit/6cd88243c7e03845a450795e134b488fc2afb736"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17","reference_id":"ChangeLog-5.18.17","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2309","reference_id":"detail?id=2309","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/"}],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2309"},{"reference_url":"https://www.debian.org/security/2023/dsa-5480","reference_id":"dsa-5480","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/"}],"url":"https://www.debian.org/security/2023/dsa-5480"},{"reference_url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736","reference_id":"?id=6cd88243c7e03845a450795e134b488fc2afb736","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/"}],"url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230214-0007/","reference_id":"ntap-20230214-0007","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230214-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5667-1/","reference_id":"USN-5667-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5667-1/"},{"reference_url":"https://usn.ubuntu.com/5683-1/","reference_id":"USN-5683-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5683-1/"},{"reference_url":"https://usn.ubuntu.com/5703-1/","reference_id":"USN-5703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5703-1/"}],"fixed_packages":[],"aliases":["CVE-2022-39189"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h82m-mnhk-67e2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78907?format=json","vulnerability_id":"VCID-jefe-c9nd-ufc1","summary":"kernel: USB-accessible buffer overflow in brcmfmac","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3628.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3628","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2069","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20671","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2055","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20407","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20858","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20916","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2063","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20706","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20785","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20742","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21114","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150960","reference_id":"2150960","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150960"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295","reference_id":"fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-08T14:15:33Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5780-1/","reference_id":"USN-5780-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5780-1/"},{"reference_url":"https://usn.ubuntu.com/5850-1/","reference_id":"USN-5850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5850-1/"},{"reference_url":"https://usn.ubuntu.com/5851-1/","reference_id":"USN-5851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5851-1/"},{"reference_url":"https://usn.ubuntu.com/5853-1/","reference_id":"USN-5853-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5853-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5874-1/","reference_id":"USN-5874-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5874-1/"},{"reference_url":"https://usn.ubuntu.com/5875-1/","reference_id":"USN-5875-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5875-1/"},{"reference_url":"https://usn.ubuntu.com/5876-1/","reference_id":"USN-5876-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5876-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5878-1/","reference_id":"USN-5878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5878-1/"},{"reference_url":"https://usn.ubuntu.com/5879-1/","reference_id":"USN-5879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5879-1/"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5909-1/","reference_id":"USN-5909-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5909-1/"},{"reference_url":"https://usn.ubuntu.com/5918-1/","reference_id":"USN-5918-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5918-1/"},{"reference_url":"https://usn.ubuntu.com/5919-1/","reference_id":"USN-5919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5919-1/"},{"reference_url":"https://usn.ubuntu.com/5920-1/","reference_id":"USN-5920-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5920-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5925-1/","reference_id":"USN-5925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5925-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/5976-1/","reference_id":"USN-5976-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5976-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3628"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jefe-c9nd-ufc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78948?format=json","vulnerability_id":"VCID-jsr8-pv5g-kba8","summary":"kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41674.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41674.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-41674","reference_id":"","reference_type":"","scores":[{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.6465","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64653","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64627","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64641","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64621","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64675","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66392","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66422","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66486","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66468","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66432","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66463","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66475","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66455","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66441","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66396","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-41674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/10/13/2","reference_id":"2","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/10/13/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134377","reference_id":"2134377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134377"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/10/13/5","reference_id":"5","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/10/13/5"},{"reference_url":"https://security.archlinux.org/ASA-202210-1","reference_id":"ASA-202210-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-1"},{"reference_url":"https://security.archlinux.org/ASA-202210-2","reference_id":"ASA-202210-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-2"},{"reference_url":"https://security.archlinux.org/ASA-202210-3","reference_id":"ASA-202210-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-3"},{"reference_url":"https://security.archlinux.org/ASA-202210-4","reference_id":"ASA-202210-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-4"},{"reference_url":"https://security.archlinux.org/AVG-2800","reference_id":"AVG-2800","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2800"},{"reference_url":"https://security.archlinux.org/AVG-2801","reference_id":"AVG-2801","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2801"},{"reference_url":"https://security.archlinux.org/AVG-2802","reference_id":"AVG-2802","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2802"},{"reference_url":"https://security.archlinux.org/AVG-2803","reference_id":"AVG-2803","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2803"},{"reference_url":"https://www.debian.org/security/2022/dsa-5257","reference_id":"dsa-5257","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://www.debian.org/security/2022/dsa-5257"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/","reference_id":"GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d","reference_id":"?id=aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d"},{"reference_url":"http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0090-1.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html","reference_id":"msg00001.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/","reference_id":"S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/net/mac80211/scan.c","reference_id":"scan.c","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/net/mac80211/scan.c"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1203770","reference_id":"show_bug.cgi?id=1203770","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1203770"},{"reference_url":"https://usn.ubuntu.com/5691-1/","reference_id":"USN-5691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5691-1/"},{"reference_url":"https://usn.ubuntu.com/5692-1/","reference_id":"USN-5692-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5692-1/"},{"reference_url":"https://usn.ubuntu.com/5693-1/","reference_id":"USN-5693-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5693-1/"},{"reference_url":"https://usn.ubuntu.com/5700-1/","reference_id":"USN-5700-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5700-1/"},{"reference_url":"https://usn.ubuntu.com/5708-1/","reference_id":"USN-5708-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5708-1/"},{"reference_url":"https://usn.ubuntu.com/5752-1/","reference_id":"USN-5752-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5752-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/","reference_id":"VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/"}],"fixed_packages":[],"aliases":["CVE-2022-41674"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jsr8-pv5g-kba8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78998?format=json","vulnerability_id":"VCID-m26e-r8mc-jbbq","summary":"kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2196.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2196.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2196","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09678","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09629","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09677","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09644","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09601","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09517","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12452","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12259","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12258","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12496","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12301","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1238","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12398","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12358","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160023","reference_id":"2160023","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160023"},{"reference_url":"https://kernel.dance/#2e7eab81425a","reference_id":"#2e7eab81425a","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/"}],"url":"https://kernel.dance/#2e7eab81425a"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5","reference_id":"?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://usn.ubuntu.com/5970-1/","reference_id":"USN-5970-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5970-1/"},{"reference_url":"https://usn.ubuntu.com/5976-1/","reference_id":"USN-5976-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5976-1/"},{"reference_url":"https://usn.ubuntu.com/5977-1/","reference_id":"USN-5977-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5977-1/"},{"reference_url":"https://usn.ubuntu.com/5978-1/","reference_id":"USN-5978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5978-1/"},{"reference_url":"https://usn.ubuntu.com/5979-1/","reference_id":"USN-5979-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5979-1/"},{"reference_url":"https://usn.ubuntu.com/5980-1/","reference_id":"USN-5980-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5980-1/"},{"reference_url":"https://usn.ubuntu.com/5982-1/","reference_id":"USN-5982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5982-1/"},{"reference_url":"https://usn.ubuntu.com/5985-1/","reference_id":"USN-5985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5985-1/"},{"reference_url":"https://usn.ubuntu.com/5987-1/","reference_id":"USN-5987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5987-1/"},{"reference_url":"https://usn.ubuntu.com/6004-1/","reference_id":"USN-6004-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6004-1/"},{"reference_url":"https://usn.ubuntu.com/6020-1/","reference_id":"USN-6020-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6020-1/"},{"reference_url":"https://usn.ubuntu.com/6151-1/","reference_id":"USN-6151-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6151-1/"}],"fixed_packages":[],"aliases":["CVE-2022-2196"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m26e-r8mc-jbbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78639?format=json","vulnerability_id":"VCID-m4wy-164p-qyh7","summary":"kernel: net/ulp: use-after-free in listening ULP sockets","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0461.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0461.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0461","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32927","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32832","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32963","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32862","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32823","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32798","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32841","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32818","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34683","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34288","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34345","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34217","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.3445","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34431","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0461"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176192","reference_id":"2176192","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176192"},{"reference_url":"https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c","reference_id":"#2c02d41d71f90a5168391b6a5f2954112ba2307c","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/"}],"url":"https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c","reference_id":"?id=2c02d41d71f90a5168391b6a5f2954112ba2307c","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1556","reference_id":"RHSA-2023:1556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1557","reference_id":"RHSA-2023:1557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1662","reference_id":"RHSA-2023:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1841","reference_id":"RHSA-2023:1841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1923","reference_id":"RHSA-2023:1923","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1923"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3190","reference_id":"RHSA-2023:3190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3191","reference_id":"RHSA-2023:3191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3465","reference_id":"RHSA-2023:3465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3470","reference_id":"RHSA-2023:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3490","reference_id":"RHSA-2023:3490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3491","reference_id":"RHSA-2023:3491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4125","reference_id":"RHSA-2023:4125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4126","reference_id":"RHSA-2023:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4146","reference_id":"RHSA-2023:4146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4146"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5911-1/","reference_id":"USN-5911-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5911-1/"},{"reference_url":"https://usn.ubuntu.com/5912-1/","reference_id":"USN-5912-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5912-1/"},{"reference_url":"https://usn.ubuntu.com/5913-1/","reference_id":"USN-5913-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5913-1/"},{"reference_url":"https://usn.ubuntu.com/5914-1/","reference_id":"USN-5914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5914-1/"},{"reference_url":"https://usn.ubuntu.com/5915-1/","reference_id":"USN-5915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5915-1/"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5919-1/","reference_id":"USN-5919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5919-1/"},{"reference_url":"https://usn.ubuntu.com/5920-1/","reference_id":"USN-5920-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5920-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5925-1/","reference_id":"USN-5925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5925-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5929-1/","reference_id":"USN-5929-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5929-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5935-1/","reference_id":"USN-5935-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5935-1/"},{"reference_url":"https://usn.ubuntu.com/5938-1/","reference_id":"USN-5938-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5938-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5941-1/","reference_id":"USN-5941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5941-1/"},{"reference_url":"https://usn.ubuntu.com/5950-1/","reference_id":"USN-5950-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5950-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/5962-1/","reference_id":"USN-5962-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5962-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/5976-1/","reference_id":"USN-5976-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5976-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"}],"fixed_packages":[],"aliases":["CVE-2023-0461"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m4wy-164p-qyh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78631?format=json","vulnerability_id":"VCID-mrhs-1bmb-3bc5","summary":"kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22998.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22998.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22998","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05243","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05279","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05252","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05184","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05188","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05859","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0589","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05926","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05935","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0595","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06041","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22998"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182429","reference_id":"2182429","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182429"},{"reference_url":"https://github.com/torvalds/linux/commit/c24968734abfed81c8f93dc5f44a7b7a9aecadfa","reference_id":"c24968734abfed81c8f93dc5f44a7b7a9aecadfa","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:03Z/"}],"url":"https://github.com/torvalds/linux/commit/c24968734abfed81c8f93dc5f44a7b7a9aecadfa"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.3","reference_id":"ChangeLog-6.0.3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:03Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.3"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2023-22998"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mrhs-1bmb-3bc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77804?format=json","vulnerability_id":"VCID-mtrd-vfmy-pbcz","summary":"kernel: ext4: kernel bug in ext4_write_inline_data_end()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33631.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33631.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33631","reference_id":"","reference_type":"","scores":[{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41093","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41166","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41228","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.4886","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48844","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48881","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48904","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48916","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48955","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48958","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48911","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48903","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48912","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48914","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48907","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33631"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/03/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/03/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/01/30/10","reference_id":"10","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/01/30/10"},{"reference_url":"https://gitee.com/src-openeuler/kernel/pulls/1389","reference_id":"1389","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"https://gitee.com/src-openeuler/kernel/pulls/1389"},{"reference_url":"https://gitee.com/src-openeuler/kernel/pulls/1396","reference_id":"1396","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"https://gitee.com/src-openeuler/kernel/pulls/1396"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/01/31/2","reference_id":"2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/01/31/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2261976","reference_id":"2261976","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2261976"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/01/30/3","reference_id":"3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/01/30/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/01/31/3","reference_id":"3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/01/31/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/01/30/4","reference_id":"4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/01/30/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/01/30/5","reference_id":"5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/01/30/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/02/6","reference_id":"6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/02/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/01/30/9","reference_id":"9","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/01/30/9"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/02/9","reference_id":"9","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/02/9"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8","reference_id":"?id=5c099c4fdc438014d5893629e70a8ba934433ee8","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8"},{"reference_url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030","reference_id":"?id=openEuler-SA-2024-1030","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030"},{"reference_url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031","reference_id":"?id=openEuler-SA-2024-1031","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031"},{"reference_url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032","reference_id":"?id=openEuler-SA-2024-1032","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032"},{"reference_url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033","reference_id":"?id=openEuler-SA-2024-1033","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033"},{"reference_url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034","reference_id":"?id=openEuler-SA-2024-1034","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034"},{"reference_url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035","reference_id":"?id=openEuler-SA-2024-1035","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/"}],"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1607","reference_id":"RHSA-2024:1607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1614","reference_id":"RHSA-2024:1614","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1653","reference_id":"RHSA-2024:1653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1836","reference_id":"RHSA-2024:1836","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1840","reference_id":"RHSA-2024:1840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2093","reference_id":"RHSA-2024:2093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2621","reference_id":"RHSA-2024:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2621"},{"reference_url":"https://usn.ubuntu.com/6865-1/","reference_id":"USN-6865-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6865-1/"},{"reference_url":"https://usn.ubuntu.com/6866-1/","reference_id":"USN-6866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6866-1/"},{"reference_url":"https://usn.ubuntu.com/6866-2/","reference_id":"USN-6866-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6866-2/"},{"reference_url":"https://usn.ubuntu.com/6866-3/","reference_id":"USN-6866-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6866-3/"}],"fixed_packages":[],"aliases":["CVE-2021-33631"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mtrd-vfmy-pbcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79087?format=json","vulnerability_id":"VCID-n2c4-w748-tyau","summary":"kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3623.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3623.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3623","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22844","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23023","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23096","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23149","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2313","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23073","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23088","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23079","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23042","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22866","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22863","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2276","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2319","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23234","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165721","reference_id":"2165721","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165721"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://www.debian.org/security/2023/dsa-5324","reference_id":"dsa-5324","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/"}],"url":"https://www.debian.org/security/2023/dsa-5324"},{"reference_url":"https://vuldb.com/?id.211921","reference_id":"?id.211921","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/"}],"url":"https://vuldb.com/?id.211921"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f","reference_id":"?id=fac35ba763ed07ba93154c95ffc0c4a55023707f","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5793-1/","reference_id":"USN-5793-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-1/"},{"reference_url":"https://usn.ubuntu.com/5793-2/","reference_id":"USN-5793-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-2/"},{"reference_url":"https://usn.ubuntu.com/5793-3/","reference_id":"USN-5793-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-3/"},{"reference_url":"https://usn.ubuntu.com/5793-4/","reference_id":"USN-5793-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-4/"},{"reference_url":"https://usn.ubuntu.com/5851-1/","reference_id":"USN-5851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5851-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5876-1/","reference_id":"USN-5876-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5876-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3623"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n2c4-w748-tyau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79149?format=json","vulnerability_id":"VCID-nck8-brgn-hkdx","summary":"kernel: use-after-free after failed devlink reload in devlink_param_get","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3625.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3625","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06021","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05836","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05869","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05906","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05917","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05932","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06159","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06154","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06107","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06118","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06169","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06106","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06089","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0613","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2144720","reference_id":"2144720","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2144720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0930","reference_id":"RHSA-2024:0930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0930"},{"reference_url":"https://usn.ubuntu.com/5728-1/","reference_id":"USN-5728-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-1/"},{"reference_url":"https://usn.ubuntu.com/5728-2/","reference_id":"USN-5728-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-2/"},{"reference_url":"https://usn.ubuntu.com/5728-3/","reference_id":"USN-5728-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5728-3/"},{"reference_url":"https://usn.ubuntu.com/5729-1/","reference_id":"USN-5729-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5729-1/"},{"reference_url":"https://usn.ubuntu.com/5729-2/","reference_id":"USN-5729-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5729-2/"}],"fixed_packages":[],"aliases":["CVE-2022-3625"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nck8-brgn-hkdx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78778?format=json","vulnerability_id":"VCID-ng25-c2xk-9fem","summary":"kernel: NULL pointer dereference in traffic control subsystem","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47929.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47929.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47929","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08731","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08685","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08699","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08652","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08654","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08589","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09472","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09521","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09508","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09556","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0957","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09541","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09525","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09419","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0942","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168246","reference_id":"2168246","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168246"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6","reference_id":"ChangeLog-6.1.6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6"},{"reference_url":"https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html","reference_id":"components.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/"}],"url":"https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html"},{"reference_url":"https://www.debian.org/security/2023/dsa-5324","reference_id":"dsa-5324","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/"}],"url":"https://www.debian.org/security/2023/dsa-5324"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407","reference_id":"?id=96398560f26aa07e8f2969d73c8197e6a6d10407","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://www.spinics.net/lists/netdev/msg555705.html","reference_id":"msg555705.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/"}],"url":"https://www.spinics.net/lists/netdev/msg555705.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5915-1/","reference_id":"USN-5915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5915-1/"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/5981-1/","reference_id":"USN-5981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5981-1/"},{"reference_url":"https://usn.ubuntu.com/5984-1/","reference_id":"USN-5984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5984-1/"},{"reference_url":"https://usn.ubuntu.com/5991-1/","reference_id":"USN-5991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5991-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6009-1/","reference_id":"USN-6009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6009-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6024-1/","reference_id":"USN-6024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6024-1/"},{"reference_url":"https://usn.ubuntu.com/6025-1/","reference_id":"USN-6025-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6025-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6040-1/","reference_id":"USN-6040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6040-1/"},{"reference_url":"https://usn.ubuntu.com/6057-1/","reference_id":"USN-6057-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6057-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6247-1/","reference_id":"USN-6247-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6247-1/"},{"reference_url":"https://usn.ubuntu.com/6248-1/","reference_id":"USN-6248-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6248-1/"}],"fixed_packages":[],"aliases":["CVE-2022-47929"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ng25-c2xk-9fem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79447?format=json","vulnerability_id":"VCID-p1a3-k51z-byc7","summary":"kernel: possible race condition in drivers/tty/tty_buffers.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1462.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1462.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1462","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12553","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12657","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12699","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12511","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12641","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12608","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12568","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1256","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12526","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12412","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12433","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12437","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12552","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13988","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13831","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078466","reference_id":"2078466","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078466"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"}],"fixed_packages":[],"aliases":["CVE-2022-1462"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p1a3-k51z-byc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78952?format=json","vulnerability_id":"VCID-pf6k-jwex-8kay","summary":"kernel: Denial of service in beacon protection for P2P-device","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42722.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42722.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42722","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2311","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23341","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2315","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23143","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23135","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23028","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23477","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23514","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23298","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23422","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23441","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23403","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23367","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23361","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134517","reference_id":"2134517","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134517"},{"reference_url":"https://security.archlinux.org/ASA-202210-1","reference_id":"ASA-202210-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-1"},{"reference_url":"https://security.archlinux.org/ASA-202210-2","reference_id":"ASA-202210-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-2"},{"reference_url":"https://security.archlinux.org/ASA-202210-3","reference_id":"ASA-202210-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-3"},{"reference_url":"https://security.archlinux.org/ASA-202210-4","reference_id":"ASA-202210-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202210-4"},{"reference_url":"https://security.archlinux.org/AVG-2800","reference_id":"AVG-2800","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2800"},{"reference_url":"https://security.archlinux.org/AVG-2801","reference_id":"AVG-2801","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2801"},{"reference_url":"https://security.archlinux.org/AVG-2802","reference_id":"AVG-2802","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2802"},{"reference_url":"https://security.archlinux.org/AVG-2803","reference_id":"AVG-2803","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2803"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1188","reference_id":"RHSA-2024:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"reference_url":"https://usn.ubuntu.com/5692-1/","reference_id":"USN-5692-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5692-1/"},{"reference_url":"https://usn.ubuntu.com/5693-1/","reference_id":"USN-5693-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5693-1/"},{"reference_url":"https://usn.ubuntu.com/5700-1/","reference_id":"USN-5700-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5700-1/"},{"reference_url":"https://usn.ubuntu.com/5708-1/","reference_id":"USN-5708-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5708-1/"},{"reference_url":"https://usn.ubuntu.com/5752-1/","reference_id":"USN-5752-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5752-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42722"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pf6k-jwex-8kay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79179?format=json","vulnerability_id":"VCID-pq7v-b14b-tuhv","summary":"Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2177.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2177.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2177","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01448","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01443","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01451","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01455","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01464","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01466","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01479","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01468","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01456","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01471","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01463","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01472","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2177"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187953","reference_id":"2187953","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187953"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0","reference_id":"?id=181d8d2066c0","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:09Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7398","reference_id":"RHSA-2023:7398","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7398"}],"fixed_packages":[],"aliases":["CVE-2023-2177"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pq7v-b14b-tuhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78965?format=json","vulnerability_id":"VCID-pyph-7y9k-gkfa","summary":"kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3707.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3707.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3707","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0264","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02518","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02516","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02502","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02507","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02614","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02599","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02587","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02623","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02521","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02527","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02548","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02528","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/","reference_id":"20221007013708.1946061-1-zyytlz.wz%40163.com","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/"}],"url":"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2137979","reference_id":"2137979","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2137979"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5915-1/","reference_id":"USN-5915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5915-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6080-1/","reference_id":"USN-6080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6080-1/"},{"reference_url":"https://usn.ubuntu.com/6085-1/","reference_id":"USN-6085-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6085-1/"},{"reference_url":"https://usn.ubuntu.com/6090-1/","reference_id":"USN-6090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6090-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6094-1/","reference_id":"USN-6094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6094-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6109-1/","reference_id":"USN-6109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6109-1/"},{"reference_url":"https://usn.ubuntu.com/6118-1/","reference_id":"USN-6118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6118-1/"},{"reference_url":"https://usn.ubuntu.com/6132-1/","reference_id":"USN-6132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6132-1/"},{"reference_url":"https://usn.ubuntu.com/6133-1/","reference_id":"USN-6133-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6133-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3707"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pyph-7y9k-gkfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79034?format=json","vulnerability_id":"VCID-qbd9-czms-8qdn","summary":"kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36280.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36280.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36280","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15231","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15255","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15295","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15294","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15105","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15413","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15482","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15285","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15373","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15423","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15384","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15345","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15195","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15201","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133450","reference_id":"2133450","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133450"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://usn.ubuntu.com/5915-1/","reference_id":"USN-5915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5915-1/"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/5976-1/","reference_id":"USN-5976-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5976-1/"},{"reference_url":"https://usn.ubuntu.com/5981-1/","reference_id":"USN-5981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5981-1/"},{"reference_url":"https://usn.ubuntu.com/5982-1/","reference_id":"USN-5982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5982-1/"},{"reference_url":"https://usn.ubuntu.com/5984-1/","reference_id":"USN-5984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5984-1/"},{"reference_url":"https://usn.ubuntu.com/5987-1/","reference_id":"USN-5987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5987-1/"},{"reference_url":"https://usn.ubuntu.com/5991-1/","reference_id":"USN-5991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5991-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6004-1/","reference_id":"USN-6004-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6004-1/"},{"reference_url":"https://usn.ubuntu.com/6009-1/","reference_id":"USN-6009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6009-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6032-1/","reference_id":"USN-6032-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6032-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"}],"fixed_packages":[],"aliases":["CVE-2022-36280"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qbd9-czms-8qdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78732?format=json","vulnerability_id":"VCID-qkam-j6uv-n7fj","summary":"kernel: NULL pointer dereference in rawv6_push_pending_frames","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0394.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0394.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0394","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06508","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06335","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06362","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06391","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06827","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0687","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06857","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06912","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06942","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06941","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06934","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06869","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06852","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162120","reference_id":"2162120","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162120"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17","reference_id":"?id=cb3e9864cdbe35ff6378966660edbcbac955fe17","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230302-0005/","reference_id":"ntap-20230302-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230302-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/5976-1/","reference_id":"USN-5976-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5976-1/"},{"reference_url":"https://usn.ubuntu.com/5978-1/","reference_id":"USN-5978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5978-1/"},{"reference_url":"https://usn.ubuntu.com/5981-1/","reference_id":"USN-5981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5981-1/"},{"reference_url":"https://usn.ubuntu.com/5984-1/","reference_id":"USN-5984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5984-1/"},{"reference_url":"https://usn.ubuntu.com/5991-1/","reference_id":"USN-5991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5991-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6009-1/","reference_id":"USN-6009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6009-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6025-1/","reference_id":"USN-6025-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6025-1/"},{"reference_url":"https://usn.ubuntu.com/6030-1/","reference_id":"USN-6030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6030-1/"},{"reference_url":"https://usn.ubuntu.com/6040-1/","reference_id":"USN-6040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6040-1/"},{"reference_url":"https://usn.ubuntu.com/6057-1/","reference_id":"USN-6057-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6057-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"}],"fixed_packages":[],"aliases":["CVE-2023-0394"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qkam-j6uv-n7fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79027?format=json","vulnerability_id":"VCID-qrf7-hb33-tqe4","summary":"kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4662.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4662.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4662","reference_id":"","reference_type":"","scores":[{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00314","published_at":"2026-04-02T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00366","published_at":"2026-05-05T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00295","published_at":"2026-04-16T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00298","published_at":"2026-04-18T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00318","published_at":"2026-04-21T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00369","published_at":"2026-05-07T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.0037","published_at":"2026-04-26T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00313","published_at":"2026-04-04T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00304","published_at":"2026-04-07T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00302","published_at":"2026-04-08T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00301","published_at":"2026-04-11T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.003","published_at":"2026-04-12T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00299","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4662"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lore.kernel.org/all/20220913140355.910732567%40linuxfoundation.org/","reference_id":"20220913140355.910732567%40linuxfoundation.org","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T18:03:46Z/"}],"url":"https://lore.kernel.org/all/20220913140355.910732567%40linuxfoundation.org/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2155788","reference_id":"2155788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2155788"},{"reference_url":"https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA%40mail.gmail.com/","reference_id":"CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA%40mail.gmail.com","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T18:03:46Z/"}],"url":"https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA%40mail.gmail.com/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6071-1/","reference_id":"USN-6071-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6071-1/"}],"fixed_packages":[],"aliases":["CVE-2022-4662"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qrf7-hb33-tqe4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75517?format=json","vulnerability_id":"VCID-svpc-cq3p-y3gw","summary":"kernel: mlxsw: spectrum: Protect driver from buggy firmware","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47560.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47560.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-47560","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07751","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07861","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07956","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0791","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07878","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07849","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07819","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07862","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07921","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07941","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07913","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07899","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07814","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07797","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07952","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-47560"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47560","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47560"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283389","reference_id":"2283389","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283389"},{"reference_url":"https://git.kernel.org/stable/c/63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047","reference_id":"63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T19:11:25Z/"}],"url":"https://git.kernel.org/stable/c/63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047"},{"reference_url":"https://git.kernel.org/stable/c/90d0736876c50ecde1a3275636a06b9ddb1cace9","reference_id":"90d0736876c50ecde1a3275636a06b9ddb1cace9","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T19:11:25Z/"}],"url":"https://git.kernel.org/stable/c/90d0736876c50ecde1a3275636a06b9ddb1cace9"},{"reference_url":"https://git.kernel.org/stable/c/da4d70199e5d82da664a80077508d6c18f5e76df","reference_id":"da4d70199e5d82da664a80077508d6c18f5e76df","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T19:11:25Z/"}],"url":"https://git.kernel.org/stable/c/da4d70199e5d82da664a80077508d6c18f5e76df"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7000","reference_id":"RHSA-2024:7000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7001","reference_id":"RHSA-2024:7001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8107","reference_id":"RHSA-2024:8107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8161","reference_id":"RHSA-2024:8161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8161"}],"fixed_packages":[],"aliases":["CVE-2021-47560"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-svpc-cq3p-y3gw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77798?format=json","vulnerability_id":"VCID-t2jg-dbdj-r3av","summary":"kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52340.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52340.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52340","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24572","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24181","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24393","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24267","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24253","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24215","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.241","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24385","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24454","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24498","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24514","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2447","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24412","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24428","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24419","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257979","reference_id":"2257979","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257979"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3","reference_id":"ChangeLog-6.3","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T13:36:20Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277","reference_id":"commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T13:36:20Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2950","reference_id":"RHSA-2024:2950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3138","reference_id":"RHSA-2024:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3138"},{"reference_url":"https://usn.ubuntu.com/6725-1/","reference_id":"USN-6725-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6725-1/"},{"reference_url":"https://usn.ubuntu.com/6725-2/","reference_id":"USN-6725-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6725-2/"},{"reference_url":"https://usn.ubuntu.com/6726-1/","reference_id":"USN-6726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6726-1/"},{"reference_url":"https://usn.ubuntu.com/6726-2/","reference_id":"USN-6726-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6726-2/"},{"reference_url":"https://usn.ubuntu.com/6726-3/","reference_id":"USN-6726-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6726-3/"}],"fixed_packages":[],"aliases":["CVE-2023-52340"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t2jg-dbdj-r3av"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79367?format=json","vulnerability_id":"VCID-vqy7-37ym-eufr","summary":"kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36879","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06944","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06975","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06971","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0682","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06984","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06842","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0686","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06925","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06932","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06935","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06904","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06849","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10686","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10552","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119855","reference_id":"2119855","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119855"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901","reference_id":"commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901"},{"reference_url":"https://www.debian.org/security/2022/dsa-5207","reference_id":"dsa-5207","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/"}],"url":"https://www.debian.org/security/2022/dsa-5207"},{"reference_url":"https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901","reference_id":"f85daf0e725358be78dfd208dea5fd665d8cb901","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/"}],"url":"https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html","reference_id":"msg00011.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220901-0007/","reference_id":"ntap-20220901-0007","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220901-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5627","reference_id":"RHSA-2023:5627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0431","reference_id":"RHSA-2024:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0432","reference_id":"RHSA-2024:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0432"},{"reference_url":"https://usn.ubuntu.com/5667-1/","reference_id":"USN-5667-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5667-1/"},{"reference_url":"https://usn.ubuntu.com/5668-1/","reference_id":"USN-5668-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5668-1/"},{"reference_url":"https://usn.ubuntu.com/5677-1/","reference_id":"USN-5677-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5677-1/"},{"reference_url":"https://usn.ubuntu.com/5682-1/","reference_id":"USN-5682-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5682-1/"},{"reference_url":"https://usn.ubuntu.com/5683-1/","reference_id":"USN-5683-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5683-1/"},{"reference_url":"https://usn.ubuntu.com/5703-1/","reference_id":"USN-5703-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5703-1/"},{"reference_url":"https://usn.ubuntu.com/5706-1/","reference_id":"USN-5706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5706-1/"},{"reference_url":"https://usn.ubuntu.com/5727-1/","reference_id":"USN-5727-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5727-1/"},{"reference_url":"https://usn.ubuntu.com/5727-2/","reference_id":"USN-5727-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5727-2/"},{"reference_url":"https://usn.ubuntu.com/5774-1/","reference_id":"USN-5774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5774-1/"},{"reference_url":"https://usn.ubuntu.com/5913-1/","reference_id":"USN-5913-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5913-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"}],"fixed_packages":[],"aliases":["CVE-2022-36879"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqy7-37ym-eufr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79094?format=json","vulnerability_id":"VCID-vzpr-mm8p-yygx","summary":"kernel: netfilter: nf_conntrack_irc message handling issue","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2663.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2663.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2663","reference_id":"","reference_type":"","scores":[{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38893","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39264","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39049","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3903","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38947","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38821","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39363","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39387","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39356","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39373","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39345","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39327","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39379","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39351","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2123056","reference_id":"2123056","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2123056"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://usn.ubuntu.com/5791-1/","reference_id":"USN-5791-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-1/"},{"reference_url":"https://usn.ubuntu.com/5791-2/","reference_id":"USN-5791-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-2/"},{"reference_url":"https://usn.ubuntu.com/5791-3/","reference_id":"USN-5791-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-3/"},{"reference_url":"https://usn.ubuntu.com/5792-1/","reference_id":"USN-5792-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5792-1/"},{"reference_url":"https://usn.ubuntu.com/5792-2/","reference_id":"USN-5792-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5792-2/"},{"reference_url":"https://usn.ubuntu.com/5793-1/","reference_id":"USN-5793-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-1/"},{"reference_url":"https://usn.ubuntu.com/5793-2/","reference_id":"USN-5793-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-2/"},{"reference_url":"https://usn.ubuntu.com/5793-3/","reference_id":"USN-5793-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-3/"},{"reference_url":"https://usn.ubuntu.com/5793-4/","reference_id":"USN-5793-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5793-4/"},{"reference_url":"https://usn.ubuntu.com/5815-1/","reference_id":"USN-5815-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5815-1/"},{"reference_url":"https://usn.ubuntu.com/5854-1/","reference_id":"USN-5854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5854-1/"},{"reference_url":"https://usn.ubuntu.com/5861-1/","reference_id":"USN-5861-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5861-1/"},{"reference_url":"https://usn.ubuntu.com/5862-1/","reference_id":"USN-5862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5862-1/"},{"reference_url":"https://usn.ubuntu.com/5865-1/","reference_id":"USN-5865-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5865-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"},{"reference_url":"https://usn.ubuntu.com/6247-1/","reference_id":"USN-6247-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6247-1/"}],"fixed_packages":[],"aliases":["CVE-2022-2663"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vzpr-mm8p-yygx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78945?format=json","vulnerability_id":"VCID-wm98-kp5f-mudg","summary":"kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3640.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3640","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06705","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07946","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07932","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0809","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08007","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07981","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0795","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08252","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08217","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08281","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.083","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08291","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08271","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2139610","reference_id":"2139610","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2139610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1877","reference_id":"RHSA-2024:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2621","reference_id":"RHSA-2024:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22910","reference_id":"RHSA-2025:22910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22914","reference_id":"RHSA-2025:22914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22914"},{"reference_url":"https://usn.ubuntu.com/5850-1/","reference_id":"USN-5850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5850-1/"},{"reference_url":"https://usn.ubuntu.com/5851-1/","reference_id":"USN-5851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5851-1/"},{"reference_url":"https://usn.ubuntu.com/5853-1/","reference_id":"USN-5853-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5853-1/"},{"reference_url":"https://usn.ubuntu.com/5860-1/","reference_id":"USN-5860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5860-1/"},{"reference_url":"https://usn.ubuntu.com/5874-1/","reference_id":"USN-5874-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5874-1/"},{"reference_url":"https://usn.ubuntu.com/5875-1/","reference_id":"USN-5875-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5875-1/"},{"reference_url":"https://usn.ubuntu.com/5876-1/","reference_id":"USN-5876-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5876-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/5878-1/","reference_id":"USN-5878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5878-1/"},{"reference_url":"https://usn.ubuntu.com/5879-1/","reference_id":"USN-5879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5879-1/"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5909-1/","reference_id":"USN-5909-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5909-1/"},{"reference_url":"https://usn.ubuntu.com/5918-1/","reference_id":"USN-5918-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5918-1/"},{"reference_url":"https://usn.ubuntu.com/5919-1/","reference_id":"USN-5919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5919-1/"},{"reference_url":"https://usn.ubuntu.com/5920-1/","reference_id":"USN-5920-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5920-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5925-1/","reference_id":"USN-5925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5925-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"},{"reference_url":"https://usn.ubuntu.com/7607-1/","reference_id":"USN-7607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7607-1/"},{"reference_url":"https://usn.ubuntu.com/7607-2/","reference_id":"USN-7607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7607-2/"},{"reference_url":"https://usn.ubuntu.com/7607-3/","reference_id":"USN-7607-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7607-3/"}],"fixed_packages":[],"aliases":["CVE-2022-3640"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wm98-kp5f-mudg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79295?format=json","vulnerability_id":"VCID-wudq-7hws-aqft","summary":"kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39188.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39188.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39188","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04387","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04411","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04457","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04467","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04452","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04403","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04546","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04578","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04642","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04638","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04667","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130141","reference_id":"2130141","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3388","reference_id":"RHSA-2023:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4801","reference_id":"RHSA-2023:4801","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4801"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4814","reference_id":"RHSA-2023:4814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4814"},{"reference_url":"https://usn.ubuntu.com/5790-1/","reference_id":"USN-5790-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5790-1/"},{"reference_url":"https://usn.ubuntu.com/5791-1/","reference_id":"USN-5791-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-1/"},{"reference_url":"https://usn.ubuntu.com/5791-2/","reference_id":"USN-5791-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-2/"},{"reference_url":"https://usn.ubuntu.com/5791-3/","reference_id":"USN-5791-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5791-3/"},{"reference_url":"https://usn.ubuntu.com/5792-1/","reference_id":"USN-5792-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5792-1/"},{"reference_url":"https://usn.ubuntu.com/5792-2/","reference_id":"USN-5792-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5792-2/"},{"reference_url":"https://usn.ubuntu.com/5815-1/","reference_id":"USN-5815-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5815-1/"},{"reference_url":"https://usn.ubuntu.com/5877-1/","reference_id":"USN-5877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5877-1/"},{"reference_url":"https://usn.ubuntu.com/6001-1/","reference_id":"USN-6001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6001-1/"},{"reference_url":"https://usn.ubuntu.com/6013-1/","reference_id":"USN-6013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6013-1/"},{"reference_url":"https://usn.ubuntu.com/6014-1/","reference_id":"USN-6014-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6014-1/"}],"fixed_packages":[],"aliases":["CVE-2022-39188"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wudq-7hws-aqft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79548?format=json","vulnerability_id":"VCID-wxfm-2u2z-euad","summary":"kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28388.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28388.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28388","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01841","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01781","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01794","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01797","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0181","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01803","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01793","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0185","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01846","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01892","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01856","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073091","reference_id":"2073091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073091"},{"reference_url":"https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2","reference_id":"3d3925ff6433f98992685a9679613a2cc97f3ce2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/","reference_id":"6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/"},{"reference_url":"https://security.archlinux.org/AVG-2698","reference_id":"AVG-2698","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2698"},{"reference_url":"https://security.archlinux.org/AVG-2699","reference_id":"AVG-2699","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2699"},{"reference_url":"https://security.archlinux.org/AVG-2700","reference_id":"AVG-2700","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2700"},{"reference_url":"https://security.archlinux.org/AVG-2701","reference_id":"AVG-2701","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2701"},{"reference_url":"https://www.debian.org/security/2022/dsa-5127","reference_id":"dsa-5127","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://www.debian.org/security/2022/dsa-5127"},{"reference_url":"https://www.debian.org/security/2022/dsa-5173","reference_id":"dsa-5173","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://www.debian.org/security/2022/dsa-5173"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/","reference_id":"LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220513-0001/","reference_id":"ntap-20220513-0001","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220513-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/5416-1/","reference_id":"USN-5416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5416-1/"},{"reference_url":"https://usn.ubuntu.com/5469-1/","reference_id":"USN-5469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5469-1/"},{"reference_url":"https://usn.ubuntu.com/5493-1/","reference_id":"USN-5493-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5493-1/"},{"reference_url":"https://usn.ubuntu.com/5493-2/","reference_id":"USN-5493-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5493-2/"},{"reference_url":"https://usn.ubuntu.com/5505-1/","reference_id":"USN-5505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5505-1/"},{"reference_url":"https://usn.ubuntu.com/5513-1/","reference_id":"USN-5513-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5513-1/"},{"reference_url":"https://usn.ubuntu.com/5539-1/","reference_id":"USN-5539-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5539-1/"},{"reference_url":"https://usn.ubuntu.com/5541-1/","reference_id":"USN-5541-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5541-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/","reference_id":"XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/"}],"fixed_packages":[],"aliases":["CVE-2022-28388"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wxfm-2u2z-euad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79145?format=json","vulnerability_id":"VCID-xxe5-16mk-dqe5","summary":"kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4129.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4129.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4129","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05017","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04989","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05026","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0503","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05365","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05955","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05709","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0575","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05746","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05811","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0579","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05782","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05776","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05739","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134528","reference_id":"2134528","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134528"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/","reference_id":"7X5SPXMXXFANDASPCKER2JIQO2F3UHCP","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/","reference_id":"AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/","reference_id":"JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t","reference_id":"t","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/"}],"url":"https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t"},{"reference_url":"https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t","reference_id":"t","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/"}],"url":"https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t"},{"reference_url":"https://usn.ubuntu.com/6025-1/","reference_id":"USN-6025-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6025-1/"},{"reference_url":"https://usn.ubuntu.com/6027-1/","reference_id":"USN-6027-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6027-1/"},{"reference_url":"https://usn.ubuntu.com/6040-1/","reference_id":"USN-6040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6040-1/"},{"reference_url":"https://usn.ubuntu.com/6057-1/","reference_id":"USN-6057-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6057-1/"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6093-1/","reference_id":"USN-6093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6093-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"}],"fixed_packages":[],"aliases":["CVE-2022-4129"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xxe5-16mk-dqe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78959?format=json","vulnerability_id":"VCID-y835-khqt-aybn","summary":"kernel: race condition in hugetlb_no_page() in mm/hugetlb.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3522.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3522.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150979","reference_id":"2150979","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"}],"fixed_packages":[],"aliases":["CVE-2022-3522"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y835-khqt-aybn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75229?format=json","vulnerability_id":"VCID-zc8z-cpdy-xkak","summary":"kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47592.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-47592","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0403","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04068","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04266","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04198","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04217","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04259","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04239","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04087","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04106","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04125","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0411","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04097","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04071","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04053","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04064","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-47592"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293235","reference_id":"2293235","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293235"},{"reference_url":"https://git.kernel.org/stable/c/97cb5c82aa1dd85a39b1bd021c8b5f18af623779","reference_id":"97cb5c82aa1dd85a39b1bd021c8b5f18af623779","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T15:19:38Z/"}],"url":"https://git.kernel.org/stable/c/97cb5c82aa1dd85a39b1bd021c8b5f18af623779"},{"reference_url":"https://git.kernel.org/stable/c/aeb7c75cb77478fdbf821628e9c95c4baa9adc63","reference_id":"aeb7c75cb77478fdbf821628e9c95c4baa9adc63","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T15:19:38Z/"}],"url":"https://git.kernel.org/stable/c/aeb7c75cb77478fdbf821628e9c95c4baa9adc63"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2148","reference_id":"RHSA-2023:2148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2458","reference_id":"RHSA-2023:2458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2736","reference_id":"RHSA-2023:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2951","reference_id":"RHSA-2023:2951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2951"}],"fixed_packages":[],"aliases":["CVE-2021-47592"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zc8z-cpdy-xkak"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-284.11.1.rt14.296%3Farch=el9_2"}