{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78997?format=json","vulnerability_id":"VCID-g5qm-fjsg-z3eq","summary":"openvswitch: Heap buffer over-read in flow.c","aliases":[{"alias":"CVE-2022-32166"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934150?format=json","purl":"pkg:deb/debian/openvswitch@2.13.0%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@2.13.0%252Bdfsg1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934137?format=json","purl":"pkg:deb/debian/openvswitch@2.15.0%2Bds1-2%2Bdeb11u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-y5t4-51s4-zqer"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@2.15.0%252Bds1-2%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1050990?format=json","purl":"pkg:deb/debian/openvswitch@2.15.0%2Bds1-2%2Bdeb11u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-y5t4-51s4-zqer"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@2.15.0%252Bds1-2%252Bdeb11u5"},{"url":"http://public2.vulnerablecode.io/api/packages/934135?format=json","purl":"pkg:deb/debian/openvswitch@3.1.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-y5t4-51s4-zqer"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@3.1.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934139?format=json","purl":"pkg:deb/debian/openvswitch@3.5.0-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-y5t4-51s4-zqer"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@3.5.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934138?format=json","purl":"pkg:deb/debian/openvswitch@3.7.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@3.7.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067597?format=json","purl":"pkg:deb/debian/openvswitch@3.7.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@3.7.1-2%3Fdistro=trixie"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036377?format=json","purl":"pkg:deb/debian/openvswitch@1.4.2%2Bgit20120612-9.1~deb7u1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-167g-xgrw-kubp"},{"vulnerability":"VCID-1rz7-uz9z-2kbr"},{"vulnerability":"VCID-21ps-f19w-87hx"},{"vulnerability":"VCID-2zq9-f9yb-v3gw"},{"vulnerability":"VCID-4rhb-vhvc-v3cx"},{"vulnerability":"VCID-5whw-rhdy-nkew"},{"vulnerability":"VCID-6gap-zvsn-fqg7"},{"vulnerability":"VCID-719y-s4zw-ekdc"},{"vulnerability":"VCID-at6t-sgxg-j7gr"},{"vulnerability":"VCID-buc7-dne2-yqaj"},{"vulnerability":"VCID-d8d2-d81a-nkgk"},{"vulnerability":"VCID-dz8t-nfj7-skgz"},{"vulnerability":"VCID-g5qm-fjsg-z3eq"},{"vulnerability":"VCID-grv1-ckdm-xbc9"},{"vulnerability":"VCID-jj4q-qp7b-j3hu"},{"vulnerability":"VCID-nw3h-mswm-v7d2"},{"vulnerability":"VCID-qrfh-87d5-ybh6"},{"vulnerability":"VCID-s6b4-xqmn-w3dc"},{"vulnerability":"VCID-sq5h-zx4v-67hm"},{"vulnerability":"VCID-suzt-srq7-6qbm"},{"vulnerability":"VCID-xcxc-et9w-uqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@1.4.2%252Bgit20120612-9.1~deb7u1.1"},{"url":"http://public2.vulnerablecode.io/api/packages/1036378?format=json","purl":"pkg:deb/debian/openvswitch@2.3.0%2Bgit20140819-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-167g-xgrw-kubp"},{"vulnerability":"VCID-1rz7-uz9z-2kbr"},{"vulnerability":"VCID-21ps-f19w-87hx"},{"vulnerability":"VCID-2zq9-f9yb-v3gw"},{"vulnerability":"VCID-4rhb-vhvc-v3cx"},{"vulnerability":"VCID-5whw-rhdy-nkew"},{"vulnerability":"VCID-6gap-zvsn-fqg7"},{"vulnerability":"VCID-719y-s4zw-ekdc"},{"vulnerability":"VCID-at6t-sgxg-j7gr"},{"vulnerability":"VCID-buc7-dne2-yqaj"},{"vulnerability":"VCID-d8d2-d81a-nkgk"},{"vulnerability":"VCID-dz8t-nfj7-skgz"},{"vulnerability":"VCID-g5qm-fjsg-z3eq"},{"vulnerability":"VCID-grv1-ckdm-xbc9"},{"vulnerability":"VCID-jj4q-qp7b-j3hu"},{"vulnerability":"VCID-nw3h-mswm-v7d2"},{"vulnerability":"VCID-qrfh-87d5-ybh6"},{"vulnerability":"VCID-s6b4-xqmn-w3dc"},{"vulnerability":"VCID-sq5h-zx4v-67hm"},{"vulnerability":"VCID-suzt-srq7-6qbm"},{"vulnerability":"VCID-xcxc-et9w-uqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@2.3.0%252Bgit20140819-3"},{"url":"http://public2.vulnerablecode.io/api/packages/1036379?format=json","purl":"pkg:deb/debian/openvswitch@2.3.0%2Bgit20140819-3%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-167g-xgrw-kubp"},{"vulnerability":"VCID-1rz7-uz9z-2kbr"},{"vulnerability":"VCID-21ps-f19w-87hx"},{"vulnerability":"VCID-2zq9-f9yb-v3gw"},{"vulnerability":"VCID-4rhb-vhvc-v3cx"},{"vulnerability":"VCID-5whw-rhdy-nkew"},{"vulnerability":"VCID-6gap-zvsn-fqg7"},{"vulnerability":"VCID-719y-s4zw-ekdc"},{"vulnerability":"VCID-at6t-sgxg-j7gr"},{"vulnerability":"VCID-buc7-dne2-yqaj"},{"vulnerability":"VCID-d8d2-d81a-nkgk"},{"vulnerability":"VCID-dz8t-nfj7-skgz"},{"vulnerability":"VCID-g5qm-fjsg-z3eq"},{"vulnerability":"VCID-grv1-ckdm-xbc9"},{"vulnerability":"VCID-jj4q-qp7b-j3hu"},{"vulnerability":"VCID-nw3h-mswm-v7d2"},{"vulnerability":"VCID-qrfh-87d5-ybh6"},{"vulnerability":"VCID-s6b4-xqmn-w3dc"},{"vulnerability":"VCID-sq5h-zx4v-67hm"},{"vulnerability":"VCID-suzt-srq7-6qbm"},{"vulnerability":"VCID-xcxc-et9w-uqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@2.3.0%252Bgit20140819-3%252Bdeb8u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1037998?format=json","purl":"pkg:deb/debian/openvswitch@2.6.2~pre%2Bgit20161223-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-167g-xgrw-kubp"},{"vulnerability":"VCID-1rz7-uz9z-2kbr"},{"vulnerability":"VCID-21ps-f19w-87hx"},{"vulnerability":"VCID-2zq9-f9yb-v3gw"},{"vulnerability":"VCID-4rhb-vhvc-v3cx"},{"vulnerability":"VCID-5whw-rhdy-nkew"},{"vulnerability":"VCID-6gap-zvsn-fqg7"},{"vulnerability":"VCID-719y-s4zw-ekdc"},{"vulnerability":"VCID-at6t-sgxg-j7gr"},{"vulnerability":"VCID-buc7-dne2-yqaj"},{"vulnerability":"VCID-d8d2-d81a-nkgk"},{"vulnerability":"VCID-dz8t-nfj7-skgz"},{"vulnerability":"VCID-g5qm-fjsg-z3eq"},{"vulnerability":"VCID-jj4q-qp7b-j3hu"},{"vulnerability":"VCID-nw3h-mswm-v7d2"},{"vulnerability":"VCID-qrfh-87d5-ybh6"},{"vulnerability":"VCID-s6b4-xqmn-w3dc"},{"vulnerability":"VCID-sq5h-zx4v-67hm"},{"vulnerability":"VCID-xcxc-et9w-uqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@2.6.2~pre%252Bgit20161223-3"},{"url":"http://public2.vulnerablecode.io/api/packages/1037999?format=json","purl":"pkg:deb/debian/openvswitch@2.10.0%2B2018.08.28%2Bgit.8ca7c82b7d%2Bds1-12%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1rz7-uz9z-2kbr"},{"vulnerability":"VCID-5whw-rhdy-nkew"},{"vulnerability":"VCID-719y-s4zw-ekdc"},{"vulnerability":"VCID-at6t-sgxg-j7gr"},{"vulnerability":"VCID-buc7-dne2-yqaj"},{"vulnerability":"VCID-d8d2-d81a-nkgk"},{"vulnerability":"VCID-dz8t-nfj7-skgz"},{"vulnerability":"VCID-g5qm-fjsg-z3eq"},{"vulnerability":"VCID-jj4q-qp7b-j3hu"},{"vulnerability":"VCID-nw3h-mswm-v7d2"},{"vulnerability":"VCID-sq5h-zx4v-67hm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@2.10.0%252B2018.08.28%252Bgit.8ca7c82b7d%252Bds1-12%252Bdeb10u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1038000?format=json","purl":"pkg:deb/debian/openvswitch@2.10.7%2Bds1-0%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1rz7-uz9z-2kbr"},{"vulnerability":"VCID-5whw-rhdy-nkew"},{"vulnerability":"VCID-719y-s4zw-ekdc"},{"vulnerability":"VCID-at6t-sgxg-j7gr"},{"vulnerability":"VCID-buc7-dne2-yqaj"},{"vulnerability":"VCID-d8d2-d81a-nkgk"},{"vulnerability":"VCID-dz8t-nfj7-skgz"},{"vulnerability":"VCID-g5qm-fjsg-z3eq"},{"vulnerability":"VCID-jj4q-qp7b-j3hu"},{"vulnerability":"VCID-nw3h-mswm-v7d2"},{"vulnerability":"VCID-sq5h-zx4v-67hm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@2.10.7%252Bds1-0%252Bdeb10u1"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32166.json","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32166","reference_id":"","reference_type":"","scores":[{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70288","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70186","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70192","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70167","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70209","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70241","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.7021","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70238","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70067","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70044","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70091","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70107","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.7013","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70116","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70103","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70146","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70156","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70135","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32166"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130577","reference_id":"2130577","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130577"},{"reference_url":"https://github.com/cloudbase/ovs/commit/2ed6505555cdcb46f9b1f0329d1491b75290fc73","reference_id":"2ed6505555cdcb46f9b1f0329d1491b75290fc73","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T14:13:38Z/"}],"url":"https://github.com/cloudbase/ovs/commit/2ed6505555cdcb46f9b1f0329d1491b75290fc73"},{"reference_url":"https://www.mend.io/vulnerability-database/CVE-2022-32166","reference_id":"CVE-2022-32166","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T14:13:38Z/"}],"url":"https://www.mend.io/vulnerability-database/CVE-2022-32166"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00036.html","reference_id":"msg00036.html","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T14:13:38Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00036.html"},{"reference_url":"https://usn.ubuntu.com/5698-1/","reference_id":"USN-5698-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5698-1/"},{"reference_url":"https://usn.ubuntu.com/5698-2/","reference_id":"USN-5698-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5698-2/"}],"weaknesses":[{"cwe_id":126,"name":"Buffer Over-read","description":"The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer."},{"cwe_id":125,"name":"Out-of-bounds Read","description":"The product reads data past the end, or before the beginning, of the intended buffer."}],"exploits":[],"severity_range_score":"6.1 - 8.6","exploitability":"0.5","weighted_severity":"7.7","risk_score":3.9,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g5qm-fjsg-z3eq"}