{"url":"http://public2.vulnerablecode.io/api/packages/930762?format=json","purl":"pkg:deb/debian/mesa@22.3.6-1%2Bdeb12u1?distro=trixie","type":"deb","namespace":"debian","name":"mesa","version":"22.3.6-1+deb12u1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"26.0.1-1","latest_non_vulnerable_version":"26.0.6-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/351712?format=json","vulnerability_id":"VCID-pfdb-qy35-hkh9","summary":"In Mesa before 25.3.6 and 26 before 26.0.1, out-of-bounds memory access can occur in WebGPU because the amount of to-be-allocated data depends on an untrusted party, and is then used for alloca.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-40393","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12903","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13001","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16177","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16341","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16234","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16231","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1619","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16062","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16307","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-40393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40393"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.freedesktop.org/archives/mesa-dev/2026-February/226597.html","reference_id":"226597.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T15:46:57Z/"}],"url":"https://lists.freedesktop.org/archives/mesa-dev/2026-February/226597.html"},{"reference_url":"https://gitlab.freedesktop.org/mesa/mesa/-/merge_requests/39866","reference_id":"39866","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T15:46:57Z/"}],"url":"https://gitlab.freedesktop.org/mesa/mesa/-/merge_requests/39866"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1063051?format=json","purl":"pkg:deb/debian/mesa@26.0.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000454?format=json","purl":"pkg:deb/debian/mesa@26.0.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067581?format=json","purl":"pkg:deb/debian/mesa@26.0.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088703?format=json","purl":"pkg:deb/debian/mesa@26.0.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.6-1%3Fdistro=trixie"}],"aliases":["CVE-2026-40393"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pfdb-qy35-hkh9"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42585?format=json","vulnerability_id":"VCID-as99-e7pb-eqcw","summary":"Multiple vulnerabilities in Mesa could result in execution of\n    arbitrary code or Denial of Service.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2012/11/stable-update-for-chrome-os_30.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2012/11/stable-update-for-chrome-os_30.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5129.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5129.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5129","reference_id":"","reference_type":"","scores":[{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63412","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63261","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63348","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63365","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63383","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.634","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63346","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63388","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63384","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63397","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63395","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5129"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=145525","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=145525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5129"},{"reference_url":"http://www.ubuntu.com/usn/USN-1818-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1818-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695248","reference_id":"695248","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695248"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=883243","reference_id":"883243","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=883243"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome:23.0.1271.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:chrome:23.0.1271.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome:23.0.1271.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome:23.0.1271.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:chrome:23.0.1271.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome:23.0.1271.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5129","reference_id":"CVE-2012-5129","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5129"},{"reference_url":"https://security.gentoo.org/glsa/201404-06","reference_id":"GLSA-201404-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201404-06"},{"reference_url":"https://usn.ubuntu.com/1818-1/","reference_id":"USN-1818-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1818-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930767?format=json","purl":"pkg:deb/debian/mesa@8.0.5-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@8.0.5-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930764?format=json","purl":"pkg:deb/debian/mesa@20.3.5-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@20.3.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930762?format=json","purl":"pkg:deb/debian/mesa@22.3.6-1%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@22.3.6-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930766?format=json","purl":"pkg:deb/debian/mesa@25.0.7-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@25.0.7-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930765?format=json","purl":"pkg:deb/debian/mesa@26.0.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000454?format=json","purl":"pkg:deb/debian/mesa@26.0.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067581?format=json","purl":"pkg:deb/debian/mesa@26.0.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088703?format=json","purl":"pkg:deb/debian/mesa@26.0.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.6-1%3Fdistro=trixie"}],"aliases":["CVE-2012-5129"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-as99-e7pb-eqcw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42584?format=json","vulnerability_id":"VCID-au65-xxvr-c7hr","summary":"Multiple vulnerabilities in Mesa could result in execution of\n    arbitrary code or Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2864.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2864.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2864","reference_id":"","reference_type":"","scores":[{"value":"0.05704","scoring_system":"epss","scoring_elements":"0.90377","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05704","scoring_system":"epss","scoring_elements":"0.9038","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05704","scoring_system":"epss","scoring_elements":"0.90392","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05704","scoring_system":"epss","scoring_elements":"0.90397","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05704","scoring_system":"epss","scoring_elements":"0.9041","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05704","scoring_system":"epss","scoring_elements":"0.90417","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05704","scoring_system":"epss","scoring_elements":"0.90425","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05704","scoring_system":"epss","scoring_elements":"0.90424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05704","scoring_system":"epss","scoring_elements":"0.90432","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05704","scoring_system":"epss","scoring_elements":"0.9043","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05704","scoring_system":"epss","scoring_elements":"0.90443","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05704","scoring_system":"epss","scoring_elements":"0.90439","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05704","scoring_system":"epss","scoring_elements":"0.90451","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05704","scoring_system":"epss","scoring_elements":"0.90468","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2864"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685667","reference_id":"685667","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685667"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=850811","reference_id":"850811","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=850811"},{"reference_url":"https://security.gentoo.org/glsa/201404-06","reference_id":"GLSA-201404-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201404-06"},{"reference_url":"https://usn.ubuntu.com/1623-1/","reference_id":"USN-1623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1623-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930763?format=json","purl":"pkg:deb/debian/mesa@8.0.4-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@8.0.4-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930764?format=json","purl":"pkg:deb/debian/mesa@20.3.5-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@20.3.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930762?format=json","purl":"pkg:deb/debian/mesa@22.3.6-1%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@22.3.6-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930766?format=json","purl":"pkg:deb/debian/mesa@25.0.7-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@25.0.7-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930765?format=json","purl":"pkg:deb/debian/mesa@26.0.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000454?format=json","purl":"pkg:deb/debian/mesa@26.0.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067581?format=json","purl":"pkg:deb/debian/mesa@26.0.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088703?format=json","purl":"pkg:deb/debian/mesa@26.0.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.6-1%3Fdistro=trixie"}],"aliases":["CVE-2012-2864"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-au65-xxvr-c7hr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42586?format=json","vulnerability_id":"VCID-gers-qjkn-2fhn","summary":"Multiple vulnerabilities in Mesa could result in execution of\n    arbitrary code or Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1872.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1872.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1872","reference_id":"","reference_type":"","scores":[{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78299","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78305","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78336","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78345","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78351","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.7836","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78353","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78382","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78381","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78378","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78418","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78434","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78448","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78472","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1872"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=923584","reference_id":"923584","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=923584"},{"reference_url":"https://security.gentoo.org/glsa/201404-06","reference_id":"GLSA-201404-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201404-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0897","reference_id":"RHSA-2013:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0897"},{"reference_url":"https://usn.ubuntu.com/1888-1/","reference_id":"USN-1888-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1888-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930768?format=json","purl":"pkg:deb/debian/mesa@8.0.5-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@8.0.5-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930764?format=json","purl":"pkg:deb/debian/mesa@20.3.5-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@20.3.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930762?format=json","purl":"pkg:deb/debian/mesa@22.3.6-1%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@22.3.6-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930766?format=json","purl":"pkg:deb/debian/mesa@25.0.7-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@25.0.7-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930765?format=json","purl":"pkg:deb/debian/mesa@26.0.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000454?format=json","purl":"pkg:deb/debian/mesa@26.0.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067581?format=json","purl":"pkg:deb/debian/mesa@26.0.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088703?format=json","purl":"pkg:deb/debian/mesa@26.0.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.6-1%3Fdistro=trixie"}],"aliases":["CVE-2013-1872"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gers-qjkn-2fhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35521?format=json","vulnerability_id":"VCID-qqd6-hfbc-3fgt","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2013-0190.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2013-0190.html"},{"reference_url":"http://lists.freedesktop.org/archives/mesa-dev/2013-May/039720.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/mesa-dev/2013-May/039720.html"},{"reference_url":"http://lists.freedesktop.org/archives/mesa-dev/2013-May/039722.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/mesa-dev/2013-May/039722.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00007.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0897.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0897.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0898.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0898.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1993.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1993.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1993","reference_id":"","reference_type":"","scores":[{"value":"0.01996","scoring_system":"epss","scoring_elements":"0.83748","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01996","scoring_system":"epss","scoring_elements":"0.83706","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01996","scoring_system":"epss","scoring_elements":"0.83729","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.8373","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83753","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.8376","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83776","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.8377","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83699","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83799","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.838","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83801","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83826","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83834","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83727","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993"},{"reference_url":"http://www.debian.org/security/2013/dsa-2678","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2678"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:181","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:181"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1888-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1888-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=961613","reference_id":"961613","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=961613"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mesa3d:mesa:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mesa3d:mesa:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mesa3d:mesa:9.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mesa3d:mesa:9.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mesa3d:mesa:9.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mesa3d:mesa:9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libglx:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libglx:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libglx:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1993","reference_id":"CVE-2013-1993","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1993"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0897","reference_id":"RHSA-2013:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0897"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0898","reference_id":"RHSA-2013:0898","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0898"},{"reference_url":"https://usn.ubuntu.com/1888-1/","reference_id":"USN-1888-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1888-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930769?format=json","purl":"pkg:deb/debian/mesa@8.0.5-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@8.0.5-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930764?format=json","purl":"pkg:deb/debian/mesa@20.3.5-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@20.3.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930762?format=json","purl":"pkg:deb/debian/mesa@22.3.6-1%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@22.3.6-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930766?format=json","purl":"pkg:deb/debian/mesa@25.0.7-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@25.0.7-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930765?format=json","purl":"pkg:deb/debian/mesa@26.0.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000454?format=json","purl":"pkg:deb/debian/mesa@26.0.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067581?format=json","purl":"pkg:deb/debian/mesa@26.0.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088703?format=json","purl":"pkg:deb/debian/mesa@26.0.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.6-1%3Fdistro=trixie"}],"aliases":["CVE-2013-1993"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qqd6-hfbc-3fgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81903?format=json","vulnerability_id":"VCID-zkay-7cyh-nkb4","summary":"mesa: security bypass in 3D library graphics","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5068.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5068.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5068","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2249","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22328","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22356","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22346","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22344","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22245","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22664","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22708","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22579","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22633","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22608","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22552","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22566","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22561","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22511","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html"},{"reference_url":"https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html"},{"reference_url":"https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857","reference_id":"","reference_type":"","scores":[],"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1770095","reference_id":"1770095","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1770095"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944298","reference_id":"944298","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944298"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:19.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mesa3d:mesa:19.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:19.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-5068","reference_id":"CVE-2019-5068","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:N"},{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-5068"},{"reference_url":"https://usn.ubuntu.com/4271-1/","reference_id":"USN-4271-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4271-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930770?format=json","purl":"pkg:deb/debian/mesa@19.2.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@19.2.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930764?format=json","purl":"pkg:deb/debian/mesa@20.3.5-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@20.3.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930762?format=json","purl":"pkg:deb/debian/mesa@22.3.6-1%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@22.3.6-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930766?format=json","purl":"pkg:deb/debian/mesa@25.0.7-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pfdb-qy35-hkh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@25.0.7-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930765?format=json","purl":"pkg:deb/debian/mesa@26.0.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000454?format=json","purl":"pkg:deb/debian/mesa@26.0.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067581?format=json","purl":"pkg:deb/debian/mesa@26.0.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088703?format=json","purl":"pkg:deb/debian/mesa@26.0.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@26.0.6-1%3Fdistro=trixie"}],"aliases":["CVE-2019-5068"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zkay-7cyh-nkb4"}],"risk_score":"2.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mesa@22.3.6-1%252Bdeb12u1%3Fdistro=trixie"}