Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/930300?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/930300?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-4?distro=trixie", "type": "deb", "namespace": "debian", "name": "lz4", "version": "1.10.0-4", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1.10.0-6", "latest_non_vulnerable_version": "1.10.0-10", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56282?format=api", "vulnerability_id": "VCID-4gmw-eahs-2fg9", "summary": "A vulnerability has been discovered in LZ4, which can lead to memory corruption.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3520.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3520.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3520", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33539", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33243", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33388", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33369", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33287", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33176", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33691", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33562", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33606", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33639", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33634", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33592", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3357", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33547", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34261", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34274", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954559", "reference_id": "1954559", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954559" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987856", "reference_id": "987856", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987856" }, { "reference_url": "https://security.archlinux.org/ASA-202105-27", "reference_id": "ASA-202105-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-27" }, { "reference_url": "https://security.archlinux.org/AVG-1889", "reference_id": "AVG-1889", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1889" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3520", "reference_id": "CVE-2021-3520", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3520" }, { "reference_url": "https://security.gentoo.org/glsa/202406-04", "reference_id": "GLSA-202406-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202406-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2575", "reference_id": "RHSA-2021:2575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1345", "reference_id": "RHSA-2022:1345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1345" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5606", "reference_id": "RHSA-2022:5606", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5606" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6407", "reference_id": "RHSA-2022:6407", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6407" }, { "reference_url": "https://usn.ubuntu.com/4968-1/", "reference_id": "USN-4968-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4968-1/" }, { "reference_url": "https://usn.ubuntu.com/4968-2/", "reference_id": "USN-4968-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4968-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930297?format=api", "purl": "pkg:deb/debian/lz4@1.9.3-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.3-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930295?format=api", "purl": "pkg:deb/debian/lz4@1.9.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930300?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930298?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930299?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-8?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062496?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076088?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-10%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-3520" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4gmw-eahs-2fg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86219?format=api", "vulnerability_id": "VCID-dvc3-wa3b-b3eg", "summary": "lz4: LZ4_decompress_generic() integer overflow (32-bit arches)", "references": [ { "reference_url": "http://blog.securitymouse.com/2014/07/i-was-wrong-proving-lz4-exploitable.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://blog.securitymouse.com/2014/07/i-was-wrong-proving-lz4-exploitable.html" }, { "reference_url": "http://fastcompression.blogspot.fr/2014/07/software-vulnerabilities-how-it-works.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://fastcompression.blogspot.fr/2014/07/software-vulnerabilities-how-it-works.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4715.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4715.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4715", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69393", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69215", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69231", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69251", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69233", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69282", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.693", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69322", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69306", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69278", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69326", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69307", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69358", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69365", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.69371", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00594", "scoring_system": "epss", "scoring_elements": "0.6935", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4715" }, { "reference_url": "https://code.google.com/p/lz4/issues/detail?id=134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/lz4/issues/detail?id=134" }, { "reference_url": "https://code.google.com/p/lz4/source/detail?r=119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/lz4/source/detail?r=119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4715" }, { "reference_url": "http://secunia.com/advisories/59770", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59770" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115767", "reference_id": "1115767", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115767" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:yann_collet:lz4:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:yann_collet:lz4:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:yann_collet:lz4:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4715", "reference_id": "CVE-2014-4715", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4715" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930296?format=api", "purl": "pkg:deb/debian/lz4@0.0~r119-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@0.0~r119-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930297?format=api", "purl": "pkg:deb/debian/lz4@1.9.3-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.3-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930295?format=api", "purl": "pkg:deb/debian/lz4@1.9.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930300?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930298?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930299?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-8?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062496?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076088?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-10%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-4715" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dvc3-wa3b-b3eg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82355?format=api", "vulnerability_id": "VCID-vb2b-utc4-2qgf", "summary": "lz4: heap-based buffer overflow in LZ4_write32", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17543.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17543.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17543", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01442", "scoring_system": "epss", "scoring_elements": "0.80675", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01442", "scoring_system": "epss", "scoring_elements": "0.8085", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01442", "scoring_system": "epss", "scoring_elements": "0.80738", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01442", "scoring_system": "epss", "scoring_elements": "0.80754", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01442", "scoring_system": "epss", "scoring_elements": "0.80739", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01442", "scoring_system": "epss", "scoring_elements": "0.80731", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01442", "scoring_system": "epss", "scoring_elements": "0.80768", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01442", "scoring_system": "epss", "scoring_elements": "0.80769", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01442", "scoring_system": "epss", "scoring_elements": "0.80828", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01442", "scoring_system": "epss", "scoring_elements": "0.80683", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01442", "scoring_system": "epss", "scoring_elements": "0.80705", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01442", "scoring_system": "epss", "scoring_elements": "0.807", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01442", "scoring_system": "epss", "scoring_elements": "0.80728", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01482", "scoring_system": "epss", "scoring_elements": "0.81061", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01482", "scoring_system": "epss", "scoring_elements": "0.81038", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01482", "scoring_system": "epss", "scoring_elements": "0.8107", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01482", "scoring_system": "epss", "scoring_elements": "0.81077", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17543" }, { "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17543" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2" }, { "reference_url": "https://github.com/lz4/lz4/issues/801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/lz4/lz4/issues/801" }, { "reference_url": "https://github.com/lz4/lz4/pull/756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/lz4/lz4/pull/756" }, { "reference_url": "https://github.com/lz4/lz4/pull/760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/lz4/lz4/pull/760" }, { "reference_url": "https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17%40%3Cissues.arrow.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17%40%3Cissues.arrow.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6%40%3Cissues.arrow.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6%40%3Cissues.arrow.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357%40%3Cissues.arrow.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357%40%3Cissues.arrow.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3%40%3Cissues.arrow.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3%40%3Cissues.arrow.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316%40%3Cissues.arrow.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316%40%3Cissues.arrow.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3%40%3Cdev.arrow.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3%40%3Cdev.arrow.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26%40%3Cissues.kudu.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26%40%3Cissues.kudu.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720%40%3Cissues.kudu.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720%40%3Cissues.kudu.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960%40%3Cissues.kudu.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960%40%3Cissues.kudu.apache.org%3E" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210723-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20210723-0001/" }, { "reference_url": "https://www.oracle.com//security-alerts/cpujul2021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765316", "reference_id": "1765316", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765316" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943680", "reference_id": "943680", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943680" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lz4_project:lz4:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:lz4_project:lz4:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lz4_project:lz4:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17543", "reference_id": "CVE-2019-17543", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11035", "reference_id": "RHSA-2025:11035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11035" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930301?format=api", "purl": "pkg:deb/debian/lz4@1.9.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930297?format=api", "purl": "pkg:deb/debian/lz4@1.9.3-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.3-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930295?format=api", "purl": "pkg:deb/debian/lz4@1.9.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930300?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930298?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930299?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-8?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062496?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076088?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-10%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17543" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vb2b-utc4-2qgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86232?format=api", "vulnerability_id": "VCID-yg6v-bv7p-m7c4", "summary": "lz4: LZ4_decompress_generic() integer overflow", "references": [ { "reference_url": "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html" }, { "reference_url": "http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html" }, { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206204a1162b995e2185275167b22468c00d6b36", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206204a1162b995e2185275167b22468c00d6b36" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00025.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4611.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4611.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4611", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.93139", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.93061", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.9307", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.93074", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.93073", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.93081", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.93086", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.9309", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.93088", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.93106", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.9311", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.93115", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.93121", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.93117", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.10105", "scoring_system": "epss", "scoring_elements": "0.93124", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4611" }, { "reference_url": "https://code.google.com/p/lz4/issues/detail?id=52", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/lz4/issues/detail?id=52" }, { "reference_url": "https://code.google.com/p/lz4/source/detail?r=118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/lz4/source/detail?r=118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4611" }, { "reference_url": "http://secunia.com/advisories/59567", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59567" }, { "reference_url": "http://secunia.com/advisories/59770", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59770" }, { "reference_url": "http://secunia.com/advisories/60238", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60238" }, { "reference_url": "https://github.com/torvalds/linux/commit/206204a1162b995e2185275167b22468c00d6b36", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/206204a1162b995e2185275167b22468c00d6b36" }, { "reference_url": "https://lists.apache.org/thread.html/r0038b5836e3bc91af3ff93721c0fc55d6543afab8cec47df7361fa0e%40%3Ccommon-dev.hadoop.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r0038b5836e3bc91af3ff93721c0fc55d6543afab8cec47df7361fa0e%40%3Ccommon-dev.hadoop.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r0addc410fdd680330054deb526323edb29e869e8d1097593f538e208%40%3Ccommon-issues.hadoop.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r0addc410fdd680330054deb526323edb29e869e8d1097593f538e208%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r229456b1fa718e329232bd7ceca4bd3e81ac55f2ec4db7314f1d7fcb%40%3Ccommon-commits.hadoop.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r229456b1fa718e329232bd7ceca4bd3e81ac55f2ec4db7314f1d7fcb%40%3Ccommon-commits.hadoop.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r31eb601a8415525fa4a77b2f624c09be3550599898468ab96d508f90%40%3Ccommon-issues.hadoop.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r31eb601a8415525fa4a77b2f624c09be3550599898468ab96d508f90%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r35b9f26c8ad91094d37bea0256012aeb065e32ff73dda5f934fefeb3%40%3Ccommon-issues.hadoop.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r35b9f26c8ad91094d37bea0256012aeb065e32ff73dda5f934fefeb3%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r5c9b4826bbd8933e4688db62f6ed9008cabb8f26bcea84d4e309caf7%40%3Ccommon-issues.hadoop.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r5c9b4826bbd8933e4688db62f6ed9008cabb8f26bcea84d4e309caf7%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r62f398f40f522cf59cfd89428835d4ca633a9764d82e4b7a12c37add%40%3Ccommon-issues.hadoop.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r62f398f40f522cf59cfd89428835d4ca633a9764d82e4b7a12c37add%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r6794c8ff8f339d95a80415b0afbe71d5eda1b97bdaca19bec78d0f8f%40%3Ccommon-commits.hadoop.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r6794c8ff8f339d95a80415b0afbe71d5eda1b97bdaca19bec78d0f8f%40%3Ccommon-commits.hadoop.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r6c998e1a47c1c3fba61a80d0dcc4b39c7fc452400c7051f685b76c0b%40%3Ccommon-issues.hadoop.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r6c998e1a47c1c3fba61a80d0dcc4b39c7fc452400c7051f685b76c0b%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r8e0111cd64a455b0a33ab12a50fba724a0218f283c759f16da8864c2%40%3Ccommon-issues.hadoop.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r8e0111cd64a455b0a33ab12a50fba724a0218f283c759f16da8864c2%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/ra72a62803eeabb6a8dc65032ca81b13ab75c271e4dff2df27c2915bb%40%3Ccommon-issues.hadoop.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/ra72a62803eeabb6a8dc65032ca81b13ab75c271e4dff2df27c2915bb%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rb301598bf24ecb6f4ce405c2a2ae23905fc4dce64277c020fc3883e5%40%3Ccommon-issues.hadoop.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/rb301598bf24ecb6f4ce405c2a2ae23905fc4dce64277c020fc3883e5%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rf4cb13d6ee891dfe2307389c8c6594a0cb10d9efb72be8bd2f97cb76%40%3Ccommon-issues.hadoop.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/rf4cb13d6ee891dfe2307389c8c6594a0cb10d9efb72be8bd2f97cb76%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "reference_url": "https://www.securitymouse.com/lms-2014-06-16-5", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.securitymouse.com/lms-2014-06-16-5" }, { "reference_url": "https://www.securitymouse.com/lms-2014-06-16-6", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.securitymouse.com/lms-2014-06-16-6" }, { "reference_url": "http://twitter.com/djrbliss/statuses/484931749013495809", "reference_id": "", "reference_type": "", "scores": [], "url": "http://twitter.com/djrbliss/statuses/484931749013495809" }, { "reference_url": "http://twitter.com/djrbliss/statuses/485042901399789568", "reference_id": "", "reference_type": "", "scores": [], "url": "http://twitter.com/djrbliss/statuses/485042901399789568" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/06/26/24", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/06/26/24" }, { "reference_url": "http://www.securitytracker.com/id/1030491", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030491" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1112436", "reference_id": "1112436", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1112436" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4611", "reference_id": "CVE-2014-4611", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4611" }, { "reference_url": "https://usn.ubuntu.com/2287-1/", "reference_id": "USN-2287-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2287-1/" }, { "reference_url": "https://usn.ubuntu.com/2288-1/", "reference_id": "USN-2288-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2288-1/" }, { "reference_url": "https://usn.ubuntu.com/2289-1/", "reference_id": "USN-2289-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2289-1/" }, { "reference_url": "https://usn.ubuntu.com/2290-1/", "reference_id": "USN-2290-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2290-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930296?format=api", "purl": "pkg:deb/debian/lz4@0.0~r119-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@0.0~r119-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930297?format=api", "purl": "pkg:deb/debian/lz4@1.9.3-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.3-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930295?format=api", "purl": "pkg:deb/debian/lz4@1.9.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930300?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930298?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930299?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-8?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062496?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076088?format=api", "purl": "pkg:deb/debian/lz4@1.10.0-10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-10%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-4611" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yg6v-bv7p-m7c4" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-4%3Fdistro=trixie" }