Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-5xtu-e6dr-97hb
Summarykernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)
Aliases
0
alias CVE-2022-1966
Fixed_packages
0
url pkg:alpm/archlinux/linux@5.18.2-1
purl pkg:alpm/archlinux/linux@5.18.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@5.18.2-1
1
url pkg:alpm/archlinux/linux-hardened@5.17.13.hardened1-1
purl pkg:alpm/archlinux/linux-hardened@5.17.13.hardened1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-hardened@5.17.13.hardened1-1
2
url pkg:alpm/archlinux/linux-lts@5.15.45-1
purl pkg:alpm/archlinux/linux-lts@5.15.45-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@5.15.45-1
3
url pkg:alpm/archlinux/linux-zen@5.18.2.zen1-1
purl pkg:alpm/archlinux/linux-zen@5.18.2.zen1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.18.2.zen1-1
Affected_packages
0
url pkg:alpm/archlinux/linux@5.18.1-1
purl pkg:alpm/archlinux/linux@5.18.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-39b6-wnhk-1uhn
1
vulnerability VCID-5xtu-e6dr-97hb
2
vulnerability VCID-e1ec-jsa3-nkeq
3
vulnerability VCID-phz7-1zx1-r3bu
4
vulnerability VCID-qb79-b4zu-sufz
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@5.18.1-1
1
url pkg:alpm/archlinux/linux-hardened@5.17.12.hardened2-2
purl pkg:alpm/archlinux/linux-hardened@5.17.12.hardened2-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-39b6-wnhk-1uhn
1
vulnerability VCID-5xtu-e6dr-97hb
2
vulnerability VCID-e1ec-jsa3-nkeq
3
vulnerability VCID-phz7-1zx1-r3bu
4
vulnerability VCID-qb79-b4zu-sufz
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-hardened@5.17.12.hardened2-2
2
url pkg:alpm/archlinux/linux-lts@5.15.44-1
purl pkg:alpm/archlinux/linux-lts@5.15.44-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-39b6-wnhk-1uhn
1
vulnerability VCID-5xtu-e6dr-97hb
2
vulnerability VCID-e1ec-jsa3-nkeq
3
vulnerability VCID-p9fd-1vjw-dbg4
4
vulnerability VCID-phz7-1zx1-r3bu
5
vulnerability VCID-qb79-b4zu-sufz
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@5.15.44-1
3
url pkg:alpm/archlinux/linux-zen@5.18.1.zen1-1
purl pkg:alpm/archlinux/linux-zen@5.18.1.zen1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-39b6-wnhk-1uhn
1
vulnerability VCID-5xtu-e6dr-97hb
2
vulnerability VCID-e1ec-jsa3-nkeq
3
vulnerability VCID-phz7-1zx1-r3bu
4
vulnerability VCID-qb79-b4zu-sufz
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.18.1.zen1-1
4
url pkg:rpm/redhat/kernel@3.10.0-1160.71.1?arch=el7
purl pkg:rpm/redhat/kernel@3.10.0-1160.71.1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5xtu-e6dr-97hb
1
vulnerability VCID-gkac-yybb-pqdv
2
vulnerability VCID-qfza-xn49-hyf1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-1160.71.1%3Farch=el7
5
url pkg:rpm/redhat/kernel@4.18.0-193.87.1?arch=el8_2
purl pkg:rpm/redhat/kernel@4.18.0-193.87.1?arch=el8_2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3wju-yesf-fbeu
1
vulnerability VCID-5c6z-1ebs-wfev
2
vulnerability VCID-5xtu-e6dr-97hb
3
vulnerability VCID-gkac-yybb-pqdv
4
vulnerability VCID-qecv-tvzh-8uat
5
vulnerability VCID-qfza-xn49-hyf1
6
vulnerability VCID-qr9t-hvpr-17dd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-193.87.1%3Farch=el8_2
6
url pkg:rpm/redhat/kernel@5.14.0-70.17.1?arch=el9_0
purl pkg:rpm/redhat/kernel@5.14.0-70.17.1?arch=el9_0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5c6z-1ebs-wfev
1
vulnerability VCID-5xtu-e6dr-97hb
2
vulnerability VCID-gkac-yybb-pqdv
3
vulnerability VCID-n8pj-dxe6-hkc9
4
vulnerability VCID-qfza-xn49-hyf1
5
vulnerability VCID-qr9t-hvpr-17dd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-70.17.1%3Farch=el9_0
7
url pkg:rpm/redhat/kernel-rt@3.10.0-1160.71.1.rt56.1212?arch=el7
purl pkg:rpm/redhat/kernel-rt@3.10.0-1160.71.1.rt56.1212?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5xtu-e6dr-97hb
1
vulnerability VCID-gkac-yybb-pqdv
2
vulnerability VCID-qfza-xn49-hyf1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.10.0-1160.71.1.rt56.1212%3Farch=el7
8
url pkg:rpm/redhat/kernel-rt@4.18.0-193.87.1.rt13.137?arch=el8_2
purl pkg:rpm/redhat/kernel-rt@4.18.0-193.87.1.rt13.137?arch=el8_2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5c6z-1ebs-wfev
1
vulnerability VCID-5xtu-e6dr-97hb
2
vulnerability VCID-gkac-yybb-pqdv
3
vulnerability VCID-qecv-tvzh-8uat
4
vulnerability VCID-qfza-xn49-hyf1
5
vulnerability VCID-qr9t-hvpr-17dd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@4.18.0-193.87.1.rt13.137%3Farch=el8_2
9
url pkg:rpm/redhat/kernel-rt@5.14.0-70.17.1.rt21.89?arch=el9_0
purl pkg:rpm/redhat/kernel-rt@5.14.0-70.17.1.rt21.89?arch=el9_0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5c6z-1ebs-wfev
1
vulnerability VCID-5xtu-e6dr-97hb
2
vulnerability VCID-gkac-yybb-pqdv
3
vulnerability VCID-qfza-xn49-hyf1
4
vulnerability VCID-qr9t-hvpr-17dd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-70.17.1.rt21.89%3Farch=el9_0
10
url pkg:rpm/redhat/redhat-virtualization-host@4.3.23-20220622.0?arch=el7_9
purl pkg:rpm/redhat/redhat-virtualization-host@4.3.23-20220622.0?arch=el7_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3adf-qttu-3kfd
1
vulnerability VCID-5xtu-e6dr-97hb
2
vulnerability VCID-gkac-yybb-pqdv
3
vulnerability VCID-xd6j-x83x-r3gn
4
vulnerability VCID-ybfq-unp3-dbav
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.3.23-20220622.0%3Farch=el7_9
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1966.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1966.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2093146
reference_id 2093146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2093146
3
reference_url https://security.archlinux.org/AVG-2751
reference_id AVG-2751
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2751
4
reference_url https://security.archlinux.org/AVG-2752
reference_id AVG-2752
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2752
5
reference_url https://security.archlinux.org/AVG-2753
reference_id AVG-2753
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2753
6
reference_url https://security.archlinux.org/AVG-2754
reference_id AVG-2754
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2754
7
reference_url https://access.redhat.com/errata/RHSA-2022:5214
reference_id RHSA-2022:5214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5214
8
reference_url https://access.redhat.com/errata/RHSA-2022:5216
reference_id RHSA-2022:5216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5216
9
reference_url https://access.redhat.com/errata/RHSA-2022:5220
reference_id RHSA-2022:5220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5220
10
reference_url https://access.redhat.com/errata/RHSA-2022:5224
reference_id RHSA-2022:5224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5224
11
reference_url https://access.redhat.com/errata/RHSA-2022:5232
reference_id RHSA-2022:5232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5232
12
reference_url https://access.redhat.com/errata/RHSA-2022:5236
reference_id RHSA-2022:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5236
13
reference_url https://access.redhat.com/errata/RHSA-2022:5249
reference_id RHSA-2022:5249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5249
14
reference_url https://access.redhat.com/errata/RHSA-2022:5267
reference_id RHSA-2022:5267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5267
15
reference_url https://access.redhat.com/errata/RHSA-2022:5439
reference_id RHSA-2022:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5439
16
reference_url https://access.redhat.com/errata/RHSA-2022:5476
reference_id RHSA-2022:5476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5476
17
reference_url https://usn.ubuntu.com/5465-1/
reference_id USN-5465-1
reference_type
scores
url https://usn.ubuntu.com/5465-1/
18
reference_url https://usn.ubuntu.com/5466-1/
reference_id USN-5466-1
reference_type
scores
url https://usn.ubuntu.com/5466-1/
19
reference_url https://usn.ubuntu.com/5467-1/
reference_id USN-5467-1
reference_type
scores
url https://usn.ubuntu.com/5467-1/
20
reference_url https://usn.ubuntu.com/5468-1/
reference_id USN-5468-1
reference_type
scores
url https://usn.ubuntu.com/5468-1/
21
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
22
reference_url https://usn.ubuntu.com/5470-1/
reference_id USN-5470-1
reference_type
scores
url https://usn.ubuntu.com/5470-1/
23
reference_url https://usn.ubuntu.com/5471-1/
reference_id USN-5471-1
reference_type
scores
url https://usn.ubuntu.com/5471-1/
Weaknesses
0
cwe_id 416
name Use After Free
description Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-5xtu-e6dr-97hb