{"url":"http://public2.vulnerablecode.io/api/packages/99428?format=json","purl":"pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202202081536_8?arch=5","type":"rpm","namespace":"redhat","name":"redhat-virtualization-host","version":"4.4.10-202202081536_8","qualifiers":{"arch":"5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79828?format=json","vulnerability_id":"VCID-45du-dgkd-p3b8","summary":"kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4155","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05347","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05378","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0542","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05443","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05416","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05403","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05396","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05345","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0551","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05547","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05584","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05585","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034813","reference_id":"2034813","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034813"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0176","reference_id":"RHSA-2022:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0186","reference_id":"RHSA-2022:0186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0187","reference_id":"RHSA-2022:0187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0188","reference_id":"RHSA-2022:0188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0231","reference_id":"RHSA-2022:0231","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0232","reference_id":"RHSA-2022:0232","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0335","reference_id":"RHSA-2022:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0344","reference_id":"RHSA-2022:0344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0529","reference_id":"RHSA-2022:0529","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0529"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0530","reference_id":"RHSA-2022:0530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0531","reference_id":"RHSA-2022:0531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0533","reference_id":"RHSA-2022:0533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0540","reference_id":"RHSA-2022:0540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0590","reference_id":"RHSA-2022:0590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0592","reference_id":"RHSA-2022:0592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0620","reference_id":"RHSA-2022:0620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0622","reference_id":"RHSA-2022:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0629","reference_id":"RHSA-2022:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0636","reference_id":"RHSA-2022:0636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0712","reference_id":"RHSA-2022:0712","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0712"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0718","reference_id":"RHSA-2022:0718","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0718"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0958","reference_id":"RHSA-2022:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1417","reference_id":"RHSA-2022:1417","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1417"},{"reference_url":"https://usn.ubuntu.com/5278-1/","reference_id":"USN-5278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5278-1/"},{"reference_url":"https://usn.ubuntu.com/5294-1/","reference_id":"USN-5294-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-1/"},{"reference_url":"https://usn.ubuntu.com/5294-2/","reference_id":"USN-5294-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-2/"},{"reference_url":"https://usn.ubuntu.com/5295-1/","reference_id":"USN-5295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5295-1/"},{"reference_url":"https://usn.ubuntu.com/5295-2/","reference_id":"USN-5295-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5295-2/"},{"reference_url":"https://usn.ubuntu.com/5297-1/","reference_id":"USN-5297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5297-1/"},{"reference_url":"https://usn.ubuntu.com/5298-1/","reference_id":"USN-5298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5298-1/"},{"reference_url":"https://usn.ubuntu.com/5362-1/","reference_id":"USN-5362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5362-1/"},{"reference_url":"https://usn.ubuntu.com/5884-1/","reference_id":"USN-5884-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5884-1/"},{"reference_url":"https://usn.ubuntu.com/5926-1/","reference_id":"USN-5926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5926-1/"}],"fixed_packages":[],"aliases":["CVE-2021-4155"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45du-dgkd-p3b8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79747?format=json","vulnerability_id":"VCID-rbaq-2dap-y7bt","summary":"kernel: fs_context: heap overflow in legacy parameter handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0185","reference_id":"","reference_type":"","scores":[{"value":"0.01828","scoring_system":"epss","scoring_elements":"0.82851","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01828","scoring_system":"epss","scoring_elements":"0.82834","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84229","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.8422","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84232","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84252","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84251","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84626","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02261","scoring_system":"epss","scoring_elements":"0.84579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02261","scoring_system":"epss","scoring_elements":"0.84604","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02261","scoring_system":"epss","scoring_elements":"0.84582","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85598","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85609","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02854","scoring_system":"epss","scoring_elements":"0.86279","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2040358","reference_id":"2040358","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2040358"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/01/18/7","reference_id":"7","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/01/18/7"},{"reference_url":"https://github.com/Crusaders-of-Rust/CVE-2022-0185","reference_id":"CVE-2022-0185","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/"}],"url":"https://github.com/Crusaders-of-Rust/CVE-2022-0185"},{"reference_url":"https://www.willsroot.io/2022/01/cve-2022-0185.html","reference_id":"cve-2022-0185.html","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/"}],"url":"https://www.willsroot.io/2022/01/cve-2022-0185.html"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2","reference_id":"?id=722d94847de2","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220225-0003/","reference_id":"ntap-20220225-0003","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220225-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0176","reference_id":"RHSA-2022:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0186","reference_id":"RHSA-2022:0186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0187","reference_id":"RHSA-2022:0187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0188","reference_id":"RHSA-2022:0188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0231","reference_id":"RHSA-2022:0231","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0232","reference_id":"RHSA-2022:0232","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0540","reference_id":"RHSA-2022:0540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0540"},{"reference_url":"https://usn.ubuntu.com/5240-1/","reference_id":"USN-5240-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5240-1/"},{"reference_url":"https://usn.ubuntu.com/5362-1/","reference_id":"USN-5362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5362-1/"}],"fixed_packages":[],"aliases":["CVE-2022-0185"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rbaq-2dap-y7bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31862?format=json","vulnerability_id":"VCID-y5u5-dgk3-u3da","summary":"A vulnerability has been found in AIDE which can lead to root privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45417.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45417","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11285","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11425","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11484","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11412","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11387","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11216","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11347","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11288","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11187","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041489","reference_id":"2041489","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041489"},{"reference_url":"https://security.gentoo.org/glsa/202311-07","reference_id":"GLSA-202311-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202311-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0440","reference_id":"RHSA-2022:0440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0441","reference_id":"RHSA-2022:0441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0456","reference_id":"RHSA-2022:0456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0456"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0464","reference_id":"RHSA-2022:0464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0472","reference_id":"RHSA-2022:0472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0473","reference_id":"RHSA-2022:0473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0540","reference_id":"RHSA-2022:0540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://usn.ubuntu.com/5243-1/","reference_id":"USN-5243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5243-1/"},{"reference_url":"https://usn.ubuntu.com/5243-2/","reference_id":"USN-5243-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5243-2/"}],"fixed_packages":[],"aliases":["CVE-2021-45417"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y5u5-dgk3-u3da"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47906?format=json","vulnerability_id":"VCID-yee7-fp2m-r7eg","summary":"A vulnerability in polkit could lead to local root privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4034.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4034.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4034","reference_id":"","reference_type":"","scores":[{"value":"0.87811","scoring_system":"epss","scoring_elements":"0.99477","published_at":"2026-04-18T12:55:00Z"},{"value":"0.87811","scoring_system":"epss","scoring_elements":"0.99474","published_at":"2026-04-13T12:55:00Z"},{"value":"0.8794","scoring_system":"epss","scoring_elements":"0.99476","published_at":"2026-04-07T12:55:00Z"},{"value":"0.8794","scoring_system":"epss","scoring_elements":"0.99475","published_at":"2026-04-04T12:55:00Z"},{"value":"0.8794","scoring_system":"epss","scoring_elements":"0.99473","published_at":"2026-04-02T12:55:00Z"},{"value":"0.8794","scoring_system":"epss","scoring_elements":"0.99478","published_at":"2026-04-09T12:55:00Z"},{"value":"0.88057","scoring_system":"epss","scoring_elements":"0.99488","published_at":"2026-04-29T12:55:00Z"},{"value":"0.88083","scoring_system":"epss","scoring_elements":"0.99488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.88472","scoring_system":"epss","scoring_elements":"0.99495","published_at":"2026-04-01T12:55:00Z"},{"value":"0.88806","scoring_system":"epss","scoring_elements":"0.99523","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2025869","reference_id":"2025869","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2025869"},{"reference_url":"https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683","reference_id":"a2bf5c9c83b6ae46cbd5c779d3055bff81ded683","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"}],"url":"https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683"},{"reference_url":"https://security.archlinux.org/ASA-202204-2","reference_id":"ASA-202204-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202204-2"},{"reference_url":"https://security.archlinux.org/AVG-2654","reference_id":"AVG-2654","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2654"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/50689.txt","reference_id":"CVE-2021-4034","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/50689.txt"},{"reference_url":"https://security.gentoo.org/glsa/202201-01","reference_id":"GLSA-202201-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202201-01"},{"reference_url":"https://www.suse.com/support/kb/doc/?id=000020564","reference_id":"?id=000020564","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"}],"url":"https://www.suse.com/support/kb/doc/?id=000020564"},{"reference_url":"https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/","reference_id":"local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"}],"url":"https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/"},{"reference_url":"http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html","reference_id":"Polkit-pkexec-Local-Privilege-Escalation.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"}],"url":"http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html"},{"reference_url":"http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html","reference_id":"Polkit-pkexec-Privilege-Escalation.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"}],"url":"http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html"},{"reference_url":"https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt","reference_id":"pwnkit.txt","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"}],"url":"https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0265","reference_id":"RHSA-2022:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0266","reference_id":"RHSA-2022:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0267","reference_id":"RHSA-2022:0267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0268","reference_id":"RHSA-2022:0268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0269","reference_id":"RHSA-2022:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0270","reference_id":"RHSA-2022:0270","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0270"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0271","reference_id":"RHSA-2022:0271","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0271"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0272","reference_id":"RHSA-2022:0272","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0272"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0273","reference_id":"RHSA-2022:0273","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0273"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0274","reference_id":"RHSA-2022:0274","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0274"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0443","reference_id":"RHSA-2022:0443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0540","reference_id":"RHSA-2022:0540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0540"},{"reference_url":"https://access.redhat.com/security/vulnerabilities/RHSB-2022-001","reference_id":"RHSB-2022-001","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"}],"url":"https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf","reference_id":"ssa-330556.pdf","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf"},{"reference_url":"https://www.starwindsoftware.com/security/sw-20220818-0001/","reference_id":"sw-20220818-0001","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"}],"url":"https://www.starwindsoftware.com/security/sw-20220818-0001/"},{"reference_url":"https://usn.ubuntu.com/5252-1/","reference_id":"USN-5252-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5252-1/"},{"reference_url":"https://usn.ubuntu.com/5252-2/","reference_id":"USN-5252-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5252-2/"}],"fixed_packages":[],"aliases":["CVE-2021-4034"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yee7-fp2m-r7eg"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202202081536_8%3Farch=5"}