{"vulnerability": "CVE-2022-49919", "sightings": [{"uuid": "ae47833b-090e-42a9-8a57-be65fdb117a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49919", "type": "seen", "source": "https://t.me/cvedetector/24244", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-49919 - Netfilter NF Tables Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-49919 \nPublished : May 1, 2025, 3:16 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnetfilter: nf_tables: release flow rule object from commit path  \n  \nNo need to postpone this to the commit release path, since no packets  \nare walking over this object, this is accessed from control plane only.  \nThis helped uncovered UAF triggered by races with the netlink notifier. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T19:01:35.000000Z"}]}