{"id":"CVE-2019-19922","details":"kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expiration would typically be seen with benign workloads, it is possible that an attacker could calculate how many stray requests are required to force an entire Kubernetes cluster into a low-performance state caused by slice expiration, and ensure that a DDoS attack sent that number of stray requests. An attack does not affect the stability of the kernel; it only causes mismanagement of application execution.)","modified":"2026-04-11T21:01:50.897071Z","published":"2019-12-22T20:15:10.823Z","database_specific":{"unresolved_ranges":[{"extracted_events":[{"introduced":"11.0"},{"last_affected":"11.70.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"h610s"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"8.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:sd-wan_edge:8.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"18.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"extracted_events":[{"last_affected":"19.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"extracted_events":[{"fixed":"5.3.9"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"extracted_events":[{"fixed":"5.3.9"}],"source":"DESCRIPTION"}]},"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200204-0002/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4226-1/"},{"type":"FIX","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9"},{"type":"FIX","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de53fd7aedb100f03e5d2231cfce0e4993282425"},{"type":"FIX","url":"https://github.com/kubernetes/kubernetes/issues/67577"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"EVIDENCE","url":"https://relistan.com/the-kernel-may-be-slowing-down-your-app"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/torvalds/linux","events":[{"introduced":"0"},{"fixed":"de53fd7aedb100f03e5d2231cfce0e4993282425"}],"database_specific":{"source":"REFERENCES"}}],"versions":["v2.6.12-rc2","v2.6.12-rc3","v2.6.12-rc4","v2.6.13","v2.6.13-rc1","v2.6.13-rc2","v2.6.13-rc3","v2.6.13-rc4","v2.6.13-rc5","v2.6.13-rc6","v2.6.13-rc7","v2.6.14-rc1","v2.6.14-rc2","v2.6.14-rc3","v2.6.15-rc1","v2.6.15-rc2","v2.6.15-rc4","v2.6.15-rc5","v2.6.15-rc7","v2.6.16","v2.6.16-rc1","v2.6.16-rc2","v2.6.16-rc3","v2.6.16-rc4","v2.6.16-rc5","v2.6.16-rc6","v2.6.17","v2.6.17-rc1","v2.6.17-rc2","v2.6.17-rc3","v2.6.17-rc4","v2.6.17-rc5","v2.6.17-rc6","v2.6.18","v2.6.18-rc1","v2.6.18-rc2","v2.6.18-rc3","v2.6.18-rc5","v2.6.18-rc6","v2.6.19-rc1","v2.6.19-rc2","v2.6.20-rc1","v2.6.20-rc2","v2.6.20-rc3","v2.6.20-rc4","v2.6.20-rc5","v2.6.20-rc6","v2.6.20-rc7","v2.6.21","v2.6.21-rc1","v2.6.21-rc2","v2.6.21-rc3","v2.6.21-rc4","v2.6.21-rc5","v2.6.21-rc6","v2.6.21-rc7","v2.6.22","v2.6.22-rc1","v2.6.22-rc2","v2.6.22-rc3","v2.6.22-rc4","v2.6.22-rc5","v2.6.22-rc6","v2.6.22-rc7","v2.6.23","v2.6.23-rc1","v2.6.23-rc2","v2.6.23-rc3","v2.6.23-rc4","v2.6.23-rc5","v2.6.23-rc6","v2.6.23-rc7","v2.6.23-rc8","v2.6.23-rc9","v2.6.24","v2.6.24-rc1","v2.6.24-rc2","v2.6.24-rc3","v2.6.24-rc4","v2.6.24-rc5","v2.6.24-rc6","v2.6.24-rc7","v2.6.24-rc8","v2.6.25","v2.6.25-rc1","v2.6.25-rc2","v2.6.25-rc3","v2.6.25-rc4","v2.6.25-rc5","v2.6.25-rc6","v2.6.25-rc7","v2.6.25-rc8","v2.6.25-rc9","v2.6.26","v2.6.26-rc1","v2.6.26-rc2","v2.6.26-rc3","v2.6.26-rc4","v2.6.26-rc5","v2.6.26-rc6","v2.6.26-rc7","v2.6.26-rc8","v2.6.26-rc9","v2.6.27","v2.6.27-rc1","v2.6.27-rc2","v2.6.27-rc3","v2.6.27-rc4","v2.6.27-rc5","v2.6.27-rc6","v2.6.27-rc7","v2.6.27-rc8","v2.6.27-rc9","v2.6.28","v2.6.28-rc1","v2.6.28-rc2","v2.6.28-rc3","v2.6.28-rc4","v2.6.28-rc5","v2.6.28-rc6","v2.6.28-rc7","v2.6.28-rc8","v2.6.28-rc9","v2.6.29","v2.6.29-rc1","v2.6.29-rc2","v2.6.29-rc3","v2.6.29-rc4","v2.6.29-rc5","v2.6.29-rc6","v2.6.29-rc7","v2.6.29-rc8","v2.6.30","v2.6.30-rc1","v2.6.30-rc2","v2.6.30-rc3","v2.6.30-rc4","v2.6.30-rc5","v2.6.30-rc6","v2.6.30-rc7","v2.6.30-rc8","v2.6.31","v2.6.31-rc1","v2.6.31-rc2","v2.6.31-rc3","v2.6.31-rc4","v2.6.31-rc5","v2.6.31-rc6","v2.6.31-rc7","v2.6.31-rc8","v2.6.31-rc9","v2.6.32","v2.6.32-rc1","v2.6.32-rc2","v2.6.32-rc3","v2.6.32-rc4","v2.6.32-rc5","v2.6.32-rc6","v2.6.32-rc7","v2.6.32-rc8","v2.6.33","v2.6.33-rc1","v2.6.33-rc2","v2.6.33-rc3","v2.6.33-rc4","v2.6.33-rc5","v2.6.33-rc6","v2.6.33-rc7","v2.6.33-rc8","v2.6.34","v2.6.34-rc1","v2.6.34-rc2","v2.6.34-rc3","v2.6.34-rc4","v2.6.34-rc5","v2.6.34-rc6","v2.6.34-rc7","v2.6.35","v2.6.35-rc1","v2.6.35-rc2","v2.6.35-rc3","v2.6.35-rc4","v2.6.35-rc5","v2.6.35-rc6","v2.6.36","v2.6.36-rc1","v2.6.36-rc2","v2.6.36-rc3","v2.6.36-rc4","v2.6.36-rc5","v2.6.36-rc6","v2.6.36-rc7","v2.6.36-rc8","v2.6.37","v2.6.37-rc1","v2.6.37-rc2","v2.6.37-rc3","v2.6.37-rc4","v2.6.37-rc5","v2.6.37-rc6","v2.6.37-rc7","v2.6.37-rc8","v2.6.38","v2.6.38-rc1","v2.6.38-rc2","v2.6.38-rc3","v2.6.38-rc4","v2.6.38-rc5","v2.6.38-rc6","v2.6.38-rc7","v2.6.38-rc8","v2.6.39","v2.6.39-rc1","v2.6.39-rc2","v2.6.39-rc3","v2.6.39-rc4","v2.6.39-rc5","v2.6.39-rc6","v2.6.39-rc7","v3.0","v3.0-rc1","v3.0-rc2","v3.0-rc3","v3.0-rc4","v3.0-rc5","v3.0-rc6","v3.0-rc7","v3.1","v3.1-rc1","v3.1-rc10","v3.1-rc2","v3.1-rc3","v3.1-rc4","v3.1-rc5","v3.1-rc6","v3.1-rc7","v3.1-rc8","v3.1-rc9","v3.10","v3.10-rc1","v3.10-rc2","v3.10-rc3","v3.10-rc4","v3.10-rc5","v3.10-rc6","v3.10-rc7","v3.11","v3.11-rc1","v3.11-rc2","v3.11-rc3","v3.11-rc4","v3.11-rc5","v3.11-rc6","v3.11-rc7","v3.12","v3.12-rc1","v3.12-rc2","v3.12-rc3","v3.12-rc4","v3.12-rc5","v3.12-rc6","v3.12-rc7","v3.13","v3.13-rc1","v3.13-rc2","v3.13-rc3","v3.13-rc4","v3.13-rc5","v3.13-rc6","v3.13-rc7","v3.13-rc8","v3.14","v3.14-rc1","v3.14-rc2","v3.14-rc3","v3.14-rc4","v3.14-rc5","v3.14-rc6","v3.14-rc7","v3.14-rc8","v3.15","v3.15-rc1","v3.15-rc2","v3.15-rc3","v3.15-rc4","v3.15-rc5","v3.15-rc6","v3.15-rc7","v3.15-rc8","v3.16","v3.16-rc1","v3.16-rc2","v3.16-rc3","v3.16-rc4","v3.16-rc5","v3.16-rc6","v3.16-rc7","v3.17","v3.17-rc1","v3.17-rc2","v3.17-rc3","v3.17-rc4","v3.17-rc5","v3.17-rc6","v3.17-rc7","v3.18","v3.18-rc1","v3.18-rc2","v3.18-rc3","v3.18-rc4","v3.18-rc5","v3.18-rc6","v3.18-rc7","v3.19","v3.19-rc1","v3.19-rc2","v3.19-rc3","v3.19-rc4","v3.19-rc5","v3.19-rc6","v3.19-rc7","v3.2","v3.2-rc1","v3.2-rc2","v3.2-rc3","v3.2-rc4","v3.2-rc5","v3.2-rc6","v3.2-rc7","v3.3","v3.3-rc1","v3.3-rc2","v3.3-rc3","v3.3-rc4","v3.3-rc5","v3.3-rc6","v3.3-rc7","v3.4","v3.4-rc1","v3.4-rc2","v3.4-rc3","v3.4-rc4","v3.4-rc5","v3.4-rc6","v3.4-rc7","v3.5","v3.5-rc1","v3.5-rc2","v3.5-rc3","v3.5-rc4","v3.5-rc5","v3.5-rc6","v3.5-rc7","v3.6","v3.6-rc1","v3.6-rc2","v3.6-rc3","v3.6-rc4","v3.6-rc5","v3.6-rc6","v3.6-rc7","v3.7","v3.7-rc1","v3.7-rc2","v3.7-rc3","v3.7-rc4","v3.7-rc5","v3.7-rc6","v3.7-rc7","v3.7-rc8","v3.8","v3.8-rc1","v3.8-rc2","v3.8-rc3","v3.8-rc4","v3.8-rc5","v3.8-rc6","v3.8-rc7","v3.9","v3.9-rc1","v3.9-rc2","v3.9-rc3","v3.9-rc4","v3.9-rc5","v3.9-rc6","v3.9-rc7","v3.9-rc8","v4.0","v4.0-rc1","v4.0-rc2","v4.0-rc3","v4.0-rc4","v4.0-rc5","v4.0-rc6","v4.0-rc7","v4.1","v4.1-rc1","v4.1-rc2","v4.1-rc3","v4.1-rc4","v4.1-rc5","v4.1-rc6","v4.1-rc7","v4.1-rc8","v4.10","v4.10-rc1","v4.10-rc2","v4.10-rc3","v4.10-rc4","v4.10-rc5","v4.10-rc6","v4.10-rc7","v4.10-rc8","v4.11","v4.11-rc1","v4.11-rc2","v4.11-rc3","v4.11-rc4","v4.11-rc5","v4.11-rc6","v4.11-rc7","v4.11-rc8","v4.12","v4.12-rc1","v4.12-rc2","v4.12-rc3","v4.12-rc4","v4.12-rc5","v4.12-rc6","v4.12-rc7","v4.13","v4.13-rc1","v4.13-rc2","v4.13-rc3","v4.13-rc4","v4.13-rc5","v4.13-rc6","v4.13-rc7","v4.14","v4.14-rc1","v4.14-rc2","v4.14-rc3","v4.14-rc4","v4.14-rc5","v4.14-rc6","v4.14-rc7","v4.14-rc8","v4.15","v4.15-rc1","v4.15-rc2","v4.15-rc3","v4.15-rc4","v4.15-rc5","v4.15-rc6","v4.15-rc7","v4.15-rc8","v4.15-rc9","v4.16","v4.16-rc1","v4.16-rc2","v4.16-rc3","v4.16-rc4","v4.16-rc5","v4.16-rc6","v4.16-rc7","v4.17","v4.17-rc1","v4.17-rc2","v4.17-rc3","v4.17-rc4","v4.17-rc5","v4.17-rc6","v4.17-rc7","v4.18","v4.18-rc1","v4.18-rc2","v4.18-rc3","v4.18-rc4","v4.18-rc5","v4.18-rc6","v4.18-rc7","v4.18-rc8","v4.19","v4.19-rc1","v4.19-rc2","v4.19-rc3","v4.19-rc4","v4.19-rc5","v4.19-rc6","v4.19-rc7","v4.19-rc8","v4.2","v4.2-rc1","v4.2-rc2","v4.2-rc3","v4.2-rc4","v4.2-rc5","v4.2-rc6","v4.2-rc7","v4.2-rc8","v4.20","v4.20-rc1","v4.20-rc2","v4.20-rc3","v4.20-rc4","v4.20-rc5","v4.20-rc6","v4.20-rc7","v4.3","v4.3-rc1","v4.3-rc2","v4.3-rc3","v4.3-rc4","v4.3-rc5","v4.3-rc6","v4.3-rc7","v4.4","v4.4-rc1","v4.4-rc2","v4.4-rc3","v4.4-rc4","v4.4-rc5","v4.4-rc6","v4.4-rc7","v4.4-rc8","v4.5","v4.5-rc1","v4.5-rc2","v4.5-rc3","v4.5-rc4","v4.5-rc5","v4.5-rc6","v4.5-rc7","v4.6","v4.6-rc1","v4.6-rc2","v4.6-rc3","v4.6-rc4","v4.6-rc5","v4.6-rc6","v4.6-rc7","v4.7","v4.7-rc1","v4.7-rc2","v4.7-rc3","v4.7-rc4","v4.7-rc5","v4.7-rc6","v4.7-rc7","v4.8","v4.8-rc1","v4.8-rc2","v4.8-rc3","v4.8-rc4","v4.8-rc5","v4.8-rc6","v4.8-rc7","v4.8-rc8","v4.9","v4.9-rc1","v4.9-rc2","v4.9-rc3","v4.9-rc4","v4.9-rc5","v4.9-rc6","v4.9-rc7","v4.9-rc8","v5.0","v5.0-rc1","v5.0-rc2","v5.0-rc3","v5.0-rc4","v5.0-rc5","v5.0-rc6","v5.0-rc7","v5.0-rc8","v5.1","v5.1-rc1","v5.1-rc2","v5.1-rc3","v5.1-rc4","v5.1-rc5","v5.1-rc6","v5.1-rc7","v5.2","v5.2-rc1","v5.2-rc2","v5.2-rc3","v5.2-rc4","v5.2-rc5","v5.2-rc6","v5.2-rc7","v5.3-rc1"],"database_specific":{"vanir_signatures":[{"deprecated":false,"target":{"function":"do_sched_cfs_slack_timer","file":"kernel/sched/fair.c"},"source":"https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425","signature_type":"Function","digest":{"length":810,"function_hash":"239800966946814700751469942376026921999"},"id":"CVE-2019-19922-0c92f5d2","signature_version":"v1"},{"deprecated":false,"target":{"function":"assign_cfs_rq_runtime","file":"kernel/sched/fair.c"},"source":"https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425","signature_type":"Function","digest":{"length":653,"function_hash":"179534685031015176513944743112908577537"},"id":"CVE-2019-19922-0cd1cda0","signature_version":"v1"},{"deprecated":false,"target":{"function":"__return_cfs_rq_runtime","file":"kernel/sched/fair.c"},"source":"https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425","signature_type":"Function","digest":{"length":482,"function_hash":"42058259032428691515012737170809819647"},"id":"CVE-2019-19922-34df8f05","signature_version":"v1"},{"deprecated":false,"target":{"function":"do_sched_cfs_period_timer","file":"kernel/sched/fair.c"},"source":"https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425","signature_type":"Function","digest":{"length":849,"function_hash":"86149416501804854968224083275328767701"},"id":"CVE-2019-19922-63eda07b","signature_version":"v1"},{"deprecated":false,"target":{"function":"expire_cfs_rq_runtime","file":"kernel/sched/fair.c"},"source":"https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425","signature_type":"Function","digest":{"length":373,"function_hash":"163693704055399239385188084000773685012"},"id":"CVE-2019-19922-64be3976","signature_version":"v1"},{"deprecated":false,"target":{"function":"__refill_cfs_bandwidth_runtime","file":"kernel/sched/fair.c"},"source":"https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425","signature_type":"Function","digest":{"length":254,"function_hash":"33457718769176401395731918789619946114"},"id":"CVE-2019-19922-734e9609","signature_version":"v1"},{"deprecated":false,"target":{"file":"kernel/sched/sched.h"},"source":"https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["164020439900726997413089503317438601964","299895821671550763038294710807236266301","243236464766716382719588702644519656371","312128919958833136832432725889471065408","63007690675848655307063588359381370079","145837244520152073815244659085279428505","39670446157205841592300081430114024504","45786708840165355673056546703568434659","276785174469264113765384636007606760146","23373960307766957249891996911897210987"]},"id":"CVE-2019-19922-770934a1","signature_version":"v1"},{"deprecated":false,"target":{"function":"distribute_cfs_runtime","file":"kernel/sched/fair.c"},"source":"https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425","signature_type":"Function","digest":{"length":627,"function_hash":"145480621377245595519067682510033127855"},"id":"CVE-2019-19922-7b6a1d6b","signature_version":"v1"},{"deprecated":false,"target":{"function":"start_cfs_bandwidth","file":"kernel/sched/fair.c"},"source":"https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425","signature_type":"Function","digest":{"length":374,"function_hash":"65064330650551048077187079696228692167"},"id":"CVE-2019-19922-96b462b5","signature_version":"v1"},{"deprecated":false,"target":{"function":"__account_cfs_rq_runtime","file":"kernel/sched/fair.c"},"source":"https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425","signature_type":"Function","digest":{"length":268,"function_hash":"102204258175389788035994743016541084821"},"id":"CVE-2019-19922-fc1f6493","signature_version":"v1"},{"deprecated":false,"target":{"file":"kernel/sched/fair.c"},"source":"https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["2014864958305326824168813638011606781","325938763174636540345623063851588743409","195888168162701757398901960279877851891","330003173763814961713813758598290517420","44364284674854891143906846501300006168","200186701501609920777685332499186237222","35784685579519276738455582003672403879","72232244531582713906025896023618901325","319644070549701921980784370632251410292","182902719177946940041578788193304908410","222503636809809072994497929482560314036","254960207494271763869904339263916663988","5187635514749928965177007333026538356","315842684698049548531344462933426110858","69496230906376048288877602095237791024","105101444702977348872208781823189524699","179610116383792301121039784987720798656","17299300111003695518576647325259487454","153087535888154445917848450057543356015","105787289713421173264569681930750275186","296013097116550376272985538190185191656","143554394338722658992705759796516427558","258280505406461053347734311601301867558","5194598816849638785320981192537933816","32199801042721774147753813516206290660","257438395905541261904135354750673306768","102165965577762319029741084691593064803","75871519361947128389951518407585622115","63836237563063313185899201654770930144","337996952086044111185324989532843848957","45966789446566986277936006235253615817","154351307068551297833594560784242734507","218225662097467388306609576012753497558","12128745278238429273652634063992328115","173432037683652575895918593789727288879","297251355493064874667765110018830726860","252004191092814767128647530510712481120","338573675811231348787497611699191818429","311090912484889145567414028650486948999","196479566981351274190881143162927058153","31375854875103818375304058524540477430","197416852244016791679847583935467651688","231081418504645040822544870686361725876","121116575752161842189203072628900613788","307549187224412120160462686183088740730","54778184982815782200375150758101521461","234788720404221947858171599124752314280","108095851304460928255976442441276603663","252266128634112638541749963237598997630","241964057394152725655108974556570467427","240033756388787813712353087683011996968","243118413743051822155010086915470210050","42634708856450237819952770132437704579","39673408172926597654453624570686421218","256698347955257242557479979863849273974","270333195908525057172901344851433855141","241934369975014282470833262711629454749","87559020520540027547771825140155778954","233242172184416737975733092975128327460","57753534268283992372486712858113302302","47684483733729049536614943115965115670","266132900410082317494255817820542882940","318601820404954146720071771137239441688","256723514398520139118655113217358338376","332479574074524830147057059769755894292","265141813060169462855514690625900202630","162264866509321892697680859514226512864","44112934983946289584188783372973171360","237794613015240435987137364743285392402","74150670133171530577593446734190999365","211433119228755266146148467768781269380","100093353728155048853746813232193964863","211172502802539424908801254263737386732","263681020371490041811029594951787360573","186534929346924014692690067482533622265","225497483145798358330581837575840429033","204905261186228131566928989077106387410","147414814561993691679054115853005632314","57052813950471439355133413106879261778","279477250574486932768549281646736679675","295635906807869655469939625270355059991","119232182510113888981265489480551801805","258399138769053074647669812587653128631","283605823781167547076917264091633797065","31727529245412136366476525410076578808","313624461881345693040222890543180869520","121773469683741494028201351736494508928"]},"id":"CVE-2019-19922-fed7aef8","signature_version":"v1"}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-19922.json","vanir_signatures_modified":"2026-04-11T21:01:50Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}