{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-2078","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2024-08-03T00:24:44.192Z","dateReserved":"2022-06-14T00:00:00.000Z","datePublished":"2022-06-30T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2022-10-17T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code."}],"affected":[{"vendor":"n/a","product":"kernel","versions":[{"version":"kernel 5.19 rc1","status":"affected"}]}],"references":[{"name":"DSA-5161","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2022/dsa-5161"},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2096178"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-121","cweId":"CWE-121"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:24:44.192Z"},"title":"CVE Program Container","references":[{"name":"DSA-5161","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2022/dsa-5161"},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85","tags":["x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2096178","tags":["x_transferred"]}]}]}}