{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79359?format=json","vulnerability_id":"VCID-e1ec-jsa3-nkeq","summary":"kernel: out-of-bounds write vulnerability in nftable may lead to local privilege escalation","aliases":[{"alias":"CVE-2022-1972"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371696?format=json","purl":"pkg:alpm/archlinux/linux@5.18.2-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@5.18.2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/371694?format=json","purl":"pkg:alpm/archlinux/linux-hardened@5.17.13.hardened1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-hardened@5.17.13.hardened1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/371748?format=json","purl":"pkg:alpm/archlinux/linux-lts@5.15.45-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@5.15.45-1"},{"url":"http://public2.vulnerablecode.io/api/packages/371692?format=json","purl":"pkg:alpm/archlinux/linux-zen@5.18.2.zen1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.18.2.zen1-1"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371695?format=json","purl":"pkg:alpm/archlinux/linux@5.18.1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-39b6-wnhk-1uhn"},{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-e1ec-jsa3-nkeq"},{"vulnerability":"VCID-phz7-1zx1-r3bu"},{"vulnerability":"VCID-qb79-b4zu-sufz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@5.18.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/371693?format=json","purl":"pkg:alpm/archlinux/linux-hardened@5.17.12.hardened2-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-39b6-wnhk-1uhn"},{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-e1ec-jsa3-nkeq"},{"vulnerability":"VCID-phz7-1zx1-r3bu"},{"vulnerability":"VCID-qb79-b4zu-sufz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-hardened@5.17.12.hardened2-2"},{"url":"http://public2.vulnerablecode.io/api/packages/371747?format=json","purl":"pkg:alpm/archlinux/linux-lts@5.15.44-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-39b6-wnhk-1uhn"},{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-e1ec-jsa3-nkeq"},{"vulnerability":"VCID-p9fd-1vjw-dbg4"},{"vulnerability":"VCID-phz7-1zx1-r3bu"},{"vulnerability":"VCID-qb79-b4zu-sufz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@5.15.44-1"},{"url":"http://public2.vulnerablecode.io/api/packages/371691?format=json","purl":"pkg:alpm/archlinux/linux-zen@5.18.1.zen1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-39b6-wnhk-1uhn"},{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-e1ec-jsa3-nkeq"},{"vulnerability":"VCID-phz7-1zx1-r3bu"},{"vulnerability":"VCID-qb79-b4zu-sufz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.18.1.zen1-1"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1972.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1972.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092537","reference_id":"2092537","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092537"},{"reference_url":"https://security.archlinux.org/AVG-2751","reference_id":"AVG-2751","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2751"},{"reference_url":"https://security.archlinux.org/AVG-2752","reference_id":"AVG-2752","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2752"},{"reference_url":"https://security.archlinux.org/AVG-2753","reference_id":"AVG-2753","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2753"},{"reference_url":"https://security.archlinux.org/AVG-2754","reference_id":"AVG-2754","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2754"},{"reference_url":"https://usn.ubuntu.com/5468-1/","reference_id":"USN-5468-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5468-1/"},{"reference_url":"https://usn.ubuntu.com/5469-1/","reference_id":"USN-5469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5469-1/"},{"reference_url":"https://usn.ubuntu.com/5470-1/","reference_id":"USN-5470-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5470-1/"},{"reference_url":"https://usn.ubuntu.com/5471-1/","reference_id":"USN-5471-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5471-1/"}],"weaknesses":[{"cwe_id":787,"name":"Out-of-bounds Write","description":"The product writes data past the end, or before the beginning, of the intended buffer."}],"exploits":[],"severity_range_score":"5.3 - 8.9","exploitability":"0.5","weighted_severity":"8.0","risk_score":4.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e1ec-jsa3-nkeq"}