{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79366?format=json","vulnerability_id":"VCID-5xtu-e6dr-97hb","summary":"kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)","aliases":[{"alias":"CVE-2022-1966"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371696?format=json","purl":"pkg:alpm/archlinux/linux@5.18.2-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@5.18.2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/371694?format=json","purl":"pkg:alpm/archlinux/linux-hardened@5.17.13.hardened1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-hardened@5.17.13.hardened1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/371748?format=json","purl":"pkg:alpm/archlinux/linux-lts@5.15.45-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@5.15.45-1"},{"url":"http://public2.vulnerablecode.io/api/packages/371692?format=json","purl":"pkg:alpm/archlinux/linux-zen@5.18.2.zen1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.18.2.zen1-1"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371695?format=json","purl":"pkg:alpm/archlinux/linux@5.18.1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-39b6-wnhk-1uhn"},{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-e1ec-jsa3-nkeq"},{"vulnerability":"VCID-phz7-1zx1-r3bu"},{"vulnerability":"VCID-qb79-b4zu-sufz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@5.18.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/371693?format=json","purl":"pkg:alpm/archlinux/linux-hardened@5.17.12.hardened2-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-39b6-wnhk-1uhn"},{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-e1ec-jsa3-nkeq"},{"vulnerability":"VCID-phz7-1zx1-r3bu"},{"vulnerability":"VCID-qb79-b4zu-sufz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-hardened@5.17.12.hardened2-2"},{"url":"http://public2.vulnerablecode.io/api/packages/371747?format=json","purl":"pkg:alpm/archlinux/linux-lts@5.15.44-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-39b6-wnhk-1uhn"},{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-e1ec-jsa3-nkeq"},{"vulnerability":"VCID-p9fd-1vjw-dbg4"},{"vulnerability":"VCID-phz7-1zx1-r3bu"},{"vulnerability":"VCID-qb79-b4zu-sufz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@5.15.44-1"},{"url":"http://public2.vulnerablecode.io/api/packages/371691?format=json","purl":"pkg:alpm/archlinux/linux-zen@5.18.1.zen1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-39b6-wnhk-1uhn"},{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-e1ec-jsa3-nkeq"},{"vulnerability":"VCID-phz7-1zx1-r3bu"},{"vulnerability":"VCID-qb79-b4zu-sufz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.18.1.zen1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/98446?format=json","purl":"pkg:rpm/redhat/kernel@3.10.0-1160.71.1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-gkac-yybb-pqdv"},{"vulnerability":"VCID-qfza-xn49-hyf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-1160.71.1%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/93201?format=json","purl":"pkg:rpm/redhat/kernel@4.18.0-193.87.1?arch=el8_2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3wju-yesf-fbeu"},{"vulnerability":"VCID-5c6z-1ebs-wfev"},{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-gkac-yybb-pqdv"},{"vulnerability":"VCID-qecv-tvzh-8uat"},{"vulnerability":"VCID-qfza-xn49-hyf1"},{"vulnerability":"VCID-qr9t-hvpr-17dd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-193.87.1%3Farch=el8_2"},{"url":"http://public2.vulnerablecode.io/api/packages/91222?format=json","purl":"pkg:rpm/redhat/kernel@5.14.0-70.17.1?arch=el9_0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5c6z-1ebs-wfev"},{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-gkac-yybb-pqdv"},{"vulnerability":"VCID-n8pj-dxe6-hkc9"},{"vulnerability":"VCID-qfza-xn49-hyf1"},{"vulnerability":"VCID-qr9t-hvpr-17dd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-70.17.1%3Farch=el9_0"},{"url":"http://public2.vulnerablecode.io/api/packages/98444?format=json","purl":"pkg:rpm/redhat/kernel-rt@3.10.0-1160.71.1.rt56.1212?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-gkac-yybb-pqdv"},{"vulnerability":"VCID-qfza-xn49-hyf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.10.0-1160.71.1.rt56.1212%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/98447?format=json","purl":"pkg:rpm/redhat/kernel-rt@4.18.0-193.87.1.rt13.137?arch=el8_2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5c6z-1ebs-wfev"},{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-gkac-yybb-pqdv"},{"vulnerability":"VCID-qecv-tvzh-8uat"},{"vulnerability":"VCID-qfza-xn49-hyf1"},{"vulnerability":"VCID-qr9t-hvpr-17dd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@4.18.0-193.87.1.rt13.137%3Farch=el8_2"},{"url":"http://public2.vulnerablecode.io/api/packages/98443?format=json","purl":"pkg:rpm/redhat/kernel-rt@5.14.0-70.17.1.rt21.89?arch=el9_0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5c6z-1ebs-wfev"},{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-gkac-yybb-pqdv"},{"vulnerability":"VCID-qfza-xn49-hyf1"},{"vulnerability":"VCID-qr9t-hvpr-17dd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-70.17.1.rt21.89%3Farch=el9_0"},{"url":"http://public2.vulnerablecode.io/api/packages/98445?format=json","purl":"pkg:rpm/redhat/redhat-virtualization-host@4.3.23-20220622.0?arch=el7_9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3adf-qttu-3kfd"},{"vulnerability":"VCID-5xtu-e6dr-97hb"},{"vulnerability":"VCID-gkac-yybb-pqdv"},{"vulnerability":"VCID-xd6j-x83x-r3gn"},{"vulnerability":"VCID-ybfq-unp3-dbav"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.3.23-20220622.0%3Farch=el7_9"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1966.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1966.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2093146","reference_id":"2093146","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2093146"},{"reference_url":"https://security.archlinux.org/AVG-2751","reference_id":"AVG-2751","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2751"},{"reference_url":"https://security.archlinux.org/AVG-2752","reference_id":"AVG-2752","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2752"},{"reference_url":"https://security.archlinux.org/AVG-2753","reference_id":"AVG-2753","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2753"},{"reference_url":"https://security.archlinux.org/AVG-2754","reference_id":"AVG-2754","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5214","reference_id":"RHSA-2022:5214","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5214"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5216","reference_id":"RHSA-2022:5216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5216"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5220","reference_id":"RHSA-2022:5220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5224","reference_id":"RHSA-2022:5224","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5224"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5232","reference_id":"RHSA-2022:5232","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5236","reference_id":"RHSA-2022:5236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5249","reference_id":"RHSA-2022:5249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5267","reference_id":"RHSA-2022:5267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5439","reference_id":"RHSA-2022:5439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5476","reference_id":"RHSA-2022:5476","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5476"},{"reference_url":"https://usn.ubuntu.com/5465-1/","reference_id":"USN-5465-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5465-1/"},{"reference_url":"https://usn.ubuntu.com/5466-1/","reference_id":"USN-5466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5466-1/"},{"reference_url":"https://usn.ubuntu.com/5467-1/","reference_id":"USN-5467-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5467-1/"},{"reference_url":"https://usn.ubuntu.com/5468-1/","reference_id":"USN-5468-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5468-1/"},{"reference_url":"https://usn.ubuntu.com/5469-1/","reference_id":"USN-5469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5469-1/"},{"reference_url":"https://usn.ubuntu.com/5470-1/","reference_id":"USN-5470-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5470-1/"},{"reference_url":"https://usn.ubuntu.com/5471-1/","reference_id":"USN-5471-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5471-1/"}],"weaknesses":[{"cwe_id":416,"name":"Use After Free","description":"Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code."}],"exploits":[],"severity_range_score":"7.0 - 8.9","exploitability":"0.5","weighted_severity":"8.0","risk_score":4.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5xtu-e6dr-97hb"}