Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/104911?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/104911?format=api", "purl": "pkg:rpm/redhat/kernel-alt@4.14.0-115.18.1?arch=el7a", "type": "rpm", "namespace": "redhat", "name": "kernel-alt", "version": "4.14.0-115.18.1", "qualifiers": { "arch": "el7a" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82123?format=api", "vulnerability_id": "VCID-cjcd-saft-fqds", "summary": "kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15916.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15916.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15916", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85576", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85522", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85545", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.8555", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85546", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85568", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85578", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85484", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85504", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85512", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85527", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85525", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02605", "scoring_system": "epss", "scoring_elements": "0.85565", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02605", "scoring_system": "epss", "scoring_elements": "0.85583", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02605", "scoring_system": "epss", "scoring_elements": "0.85553", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15916" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20191004-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20191004-0001/" }, { "reference_url": "https://support.f5.com/csp/article/K57418558?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K57418558?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750813", "reference_id": "1750813", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750813" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15916", "reference_id": "CVE-2019-15916", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15916" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3309", "reference_id": "RHSA-2019:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3517", "reference_id": "RHSA-2019:3517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740", "reference_id": "RHSA-2020:0740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1016", "reference_id": "RHSA-2020:1016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1070", "reference_id": "RHSA-2020:1070", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1070" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2522", "reference_id": "RHSA-2020:2522", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2522" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2851", "reference_id": "RHSA-2020:2851", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2851" } ], "fixed_packages": [], "aliases": [ "CVE-2019-15916" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cjcd-saft-fqds" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82877?format=api", "vulnerability_id": "VCID-ffu4-v4aq-1bdz", "summary": "kernel: Heap address information leak while using L2CAP_GET_CONF_OPT", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3459.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3459.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3459", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64267", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64416", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64381", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64392", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64383", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64403", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64325", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64353", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64311", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64359", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64374", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64386", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64345", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3459" }, { "reference_url": "https://bugzilla.novell.com/show_bug.cgi?id=1120758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.novell.com/show_bug.cgi?id=1120758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html" }, { "reference_url": "https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047%40kroah.com/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047%40kroah.com/" }, { "reference_url": "https://marc.info/?l=oss-security&m=154721580222522&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://marc.info/?l=oss-security&m=154721580222522&w=2" }, { "reference_url": "https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/27/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/06/27/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/27/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/06/27/7" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/28/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/06/28/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/28/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/08/12/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/08/12/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176", "reference_id": "1663176", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176" }, { "reference_url": "https://security.archlinux.org/AVG-988", "reference_id": "AVG-988", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-988" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459", "reference_id": "CVE-2019-3459", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2029", "reference_id": "RHSA-2019:2029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2043", "reference_id": "RHSA-2019:2043", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2043" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3309", "reference_id": "RHSA-2019:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3517", "reference_id": "RHSA-2019:3517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740", "reference_id": "RHSA-2020:0740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "reference_url": "https://usn.ubuntu.com/3930-1/", "reference_id": "USN-3930-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3930-1/" }, { "reference_url": "https://usn.ubuntu.com/3930-2/", "reference_id": "USN-3930-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3930-2/" }, { "reference_url": "https://usn.ubuntu.com/3931-1/", "reference_id": "USN-3931-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3931-1/" }, { "reference_url": "https://usn.ubuntu.com/3931-2/", "reference_id": "USN-3931-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3931-2/" }, { "reference_url": "https://usn.ubuntu.com/3932-1/", "reference_id": "USN-3932-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3932-1/" }, { "reference_url": "https://usn.ubuntu.com/3932-2/", "reference_id": "USN-3932-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3932-2/" }, { "reference_url": "https://usn.ubuntu.com/3933-1/", "reference_id": "USN-3933-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3933-1/" }, { "reference_url": "https://usn.ubuntu.com/3933-2/", "reference_id": "USN-3933-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3933-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-3459" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ffu4-v4aq-1bdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82117?format=api", "vulnerability_id": "VCID-ftpc-yjny-9qdw", "summary": "kernel: powerpc: local user can read vector registers of other users' processes via a Facility Unavailable exception", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15030.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15030.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15030", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23298", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23129", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23335", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23144", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23137", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23471", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23508", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23292", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23364", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23415", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23435", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23397", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23344", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23361", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23355", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15030" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8205d5d98ef7f155de211f5e2eb6ca03d95a5a60", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8205d5d98ef7f155de211f5e2eb6ca03d95a5a60" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20191004-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20191004-0001/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/09/10/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/09/10/3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759313", "reference_id": "1759313", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759313" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15030", "reference_id": "CVE-2019-15030", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:P" }, { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740", "reference_id": "RHSA-2020:0740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1372", "reference_id": "RHSA-2020:1372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1372" }, { "reference_url": "https://usn.ubuntu.com/4135-1/", "reference_id": "USN-4135-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4135-1/" }, { "reference_url": "https://usn.ubuntu.com/4135-2/", "reference_id": "USN-4135-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4135-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-15030" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftpc-yjny-9qdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82878?format=api", "vulnerability_id": "VCID-h2h4-ypwg-rbh8", "summary": "kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3460.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3460.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3460", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64267", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64416", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64381", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64392", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64383", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64403", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64325", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64353", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64311", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64359", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64374", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64386", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64345", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3460" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/linus/af3d5d1c87664a4f150fcf3534c6567cb19909b0", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/linus/af3d5d1c87664a4f150fcf3534c6567cb19909b0" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html" }, { "reference_url": "https://lore.kernel.org/linux-bluetooth/20190110062917.GB15047%40kroah.com/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lore.kernel.org/linux-bluetooth/20190110062917.GB15047%40kroah.com/" }, { "reference_url": "https://marc.info/?l=oss-security&m=154721580222522&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://marc.info/?l=oss-security&m=154721580222522&w=2" }, { "reference_url": "https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/27/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/06/27/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/27/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/06/27/7" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/28/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/06/28/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/28/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/08/12/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/08/12/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663179", "reference_id": "1663179", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663179" }, { "reference_url": "https://security.archlinux.org/AVG-988", "reference_id": "AVG-988", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-988" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460", "reference_id": "CVE-2019-3460", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2029", "reference_id": "RHSA-2019:2029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2043", "reference_id": "RHSA-2019:2043", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2043" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3309", "reference_id": "RHSA-2019:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3517", "reference_id": "RHSA-2019:3517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740", "reference_id": "RHSA-2020:0740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "reference_url": "https://usn.ubuntu.com/3930-1/", "reference_id": "USN-3930-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3930-1/" }, { "reference_url": "https://usn.ubuntu.com/3930-2/", "reference_id": "USN-3930-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3930-2/" }, { "reference_url": "https://usn.ubuntu.com/3931-1/", "reference_id": "USN-3931-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3931-1/" }, { "reference_url": "https://usn.ubuntu.com/3931-2/", "reference_id": "USN-3931-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3931-2/" }, { "reference_url": "https://usn.ubuntu.com/3932-1/", "reference_id": "USN-3932-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3932-1/" }, { "reference_url": "https://usn.ubuntu.com/3932-2/", "reference_id": "USN-3932-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3932-2/" }, { "reference_url": "https://usn.ubuntu.com/3933-1/", "reference_id": "USN-3933-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3933-1/" }, { "reference_url": "https://usn.ubuntu.com/3933-2/", "reference_id": "USN-3933-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3933-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-3460" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h2h4-ypwg-rbh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82641?format=api", "vulnerability_id": "VCID-h5gr-4v52-kybw", "summary": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18805.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18805.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-18805", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68541", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68559", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68577", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68554", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68605", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68623", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68648", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68635", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68606", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68645", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68656", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68636", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68685", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.6869", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68695", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-18805" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18805", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18805" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496", "reference_id": "1771496", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740", "reference_id": "RHSA-2020:0740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1567", "reference_id": "RHSA-2020:1567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1769", "reference_id": "RHSA-2020:1769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "fixed_packages": [], "aliases": [ "CVE-2019-18805" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h5gr-4v52-kybw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79052?format=api", "vulnerability_id": "VCID-jqvb-tqv1-dfe5", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11884.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11884.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11884", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14775", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14825", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14705", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14796", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14856", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14813", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14776", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1472", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14614", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14621", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14684", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14715", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14714", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1465", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11884" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709837", "reference_id": "1709837", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3309", "reference_id": "RHSA-2019:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3517", "reference_id": "RHSA-2019:3517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740", "reference_id": "RHSA-2020:0740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1016", "reference_id": "RHSA-2020:1016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1070", "reference_id": "RHSA-2020:1070", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1070" }, { "reference_url": "https://usn.ubuntu.com/4068-1/", "reference_id": "USN-4068-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4068-1/" }, { "reference_url": "https://usn.ubuntu.com/4068-2/", "reference_id": "USN-4068-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4068-2/" }, { "reference_url": "https://usn.ubuntu.com/4069-1/", "reference_id": "USN-4069-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4069-1/" }, { "reference_url": "https://usn.ubuntu.com/4069-2/", "reference_id": "USN-4069-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4069-2/" }, { "reference_url": "https://usn.ubuntu.com/4076-1/", "reference_id": "USN-4076-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4076-1/" }, { "reference_url": "https://usn.ubuntu.com/4118-1/", "reference_id": "USN-4118-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4118-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-11884" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqvb-tqv1-dfe5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82497?format=api", "vulnerability_id": "VCID-w97y-ev7x-b7cv", "summary": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16871.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16871.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16871", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81216", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81225", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81248", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81246", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81275", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.8128", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.813", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81287", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81279", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81316", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.8134", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81347", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81352", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16871" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162", "reference_id": "1655162", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1873", "reference_id": "RHSA-2019:1873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1891", "reference_id": "RHSA-2019:1891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2696", "reference_id": "RHSA-2019:2696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2696" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2730", "reference_id": "RHSA-2019:2730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740", "reference_id": "RHSA-2020:0740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1567", "reference_id": "RHSA-2020:1567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1769", "reference_id": "RHSA-2020:1769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "fixed_packages": [], "aliases": [ "CVE-2018-16871" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w97y-ev7x-b7cv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81908?format=api", "vulnerability_id": "VCID-yy9m-hrxz-mkhg", "summary": "kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17666.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17666.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17666", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63457", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63598", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63593", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63578", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6358", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63589", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63572", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6359", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63603", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63516", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63544", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6356", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63577", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17666" }, { "reference_url": "https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRBP4O6D2SQ2NHCRHTJONGCZLWOIV5MN/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRBP4O6D2SQ2NHCRHTJONGCZLWOIV5MN/" }, { "reference_url": "https://lkml.org/lkml/2019/10/16/1226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lkml.org/lkml/2019/10/16/1226" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20191031-0005/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20191031-0005/" }, { "reference_url": "https://twitter.com/nicowaisman/status/1184864519316758535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://twitter.com/nicowaisman/status/1184864519316758535" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763690", "reference_id": "1763690", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763690" }, { "reference_url": "https://security.archlinux.org/ASA-201911-10", "reference_id": "ASA-201911-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201911-10" }, { "reference_url": "https://security.archlinux.org/ASA-201911-11", "reference_id": "ASA-201911-11", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201911-11" }, { "reference_url": "https://security.archlinux.org/ASA-201911-12", "reference_id": "ASA-201911-12", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201911-12" }, { "reference_url": "https://security.archlinux.org/ASA-201911-9", "reference_id": "ASA-201911-9", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201911-9" }, { "reference_url": "https://security.archlinux.org/AVG-1063", "reference_id": "AVG-1063", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1063" }, { "reference_url": "https://security.archlinux.org/AVG-1064", "reference_id": "AVG-1064", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1064" }, { "reference_url": "https://security.archlinux.org/AVG-1065", "reference_id": "AVG-1065", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1065" }, { "reference_url": "https://security.archlinux.org/AVG-1066", "reference_id": "AVG-1066", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1066" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17666", "reference_id": "CVE-2019-17666", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17666" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0328", "reference_id": "RHSA-2020:0328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0339", "reference_id": "RHSA-2020:0339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0543", "reference_id": "RHSA-2020:0543", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0661", "reference_id": "RHSA-2020:0661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740", "reference_id": "RHSA-2020:0740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0831", "reference_id": "RHSA-2020:0831", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0831" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0834", "reference_id": "RHSA-2020:0834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0839", "reference_id": "RHSA-2020:0839", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1347", "reference_id": "RHSA-2020:1347", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1347" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1353", "reference_id": "RHSA-2020:1353", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1353" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1465", "reference_id": "RHSA-2020:1465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1473", "reference_id": "RHSA-2020:1473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1524", "reference_id": "RHSA-2020:1524", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1524" }, { "reference_url": "https://usn.ubuntu.com/4183-1/", "reference_id": "USN-4183-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4183-1/" }, { "reference_url": "https://usn.ubuntu.com/4184-1/", "reference_id": "USN-4184-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4184-1/" }, { "reference_url": "https://usn.ubuntu.com/4185-1/", "reference_id": "USN-4185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4185-1/" }, { "reference_url": "https://usn.ubuntu.com/4186-1/", "reference_id": "USN-4186-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4186-1/" }, { "reference_url": "https://usn.ubuntu.com/4186-2/", "reference_id": "USN-4186-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4186-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-17666" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yy9m-hrxz-mkhg" } ], "fixing_vulnerabilities": [], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-alt@4.14.0-115.18.1%3Farch=el7a" }