{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T16:29:37.713","vulnerabilities":[{"cve":{"id":"CVE-2019-11480","sourceIdentifier":"security@ubuntu.com","published":"2020-04-14T02:15:10.757","lastModified":"2024-11-21T04:21:10.087","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The pc-kernel snap build process hardcoded the --allow-insecure-repositories and --allow-unauthenticated apt options when creating the build chroot environment. This could allow an attacker who is able to perform a MITM attack between the build environment and the Ubuntu archive to install a malicious package within the build chroot. This issue affects pc-kernel versions prior to and including 2019-07-16"},{"lang":"es","value":"El proceso de compilación instantánea de pc-kernel embebió las opciones apt --allow-insecure-repositories y --allow-unauthenticated cuando se crea el entorno chroot de compilación. Esto podría permitir a un atacante, que sea capaz de realizar un ataque de tipo MITM entre el entorno de compilación y el archivo de Ubuntu, instalar un paquete malicioso dentro del chroot de compilación. Este problema afecta al pc-kernel versiones anteriores e incluyendo a la 2019-07-16."}],"metrics":{"cvssMetricV31":[{"source":"security@ubuntu.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.7,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security@ubuntu.com","type":"Secondary","description":[{"lang":"en","value":"CWE-353"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-345"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:c-kernel:*:*:*:*:*:*:*:*","versionEndIncluding":"2019-07-16","matchCriteriaId":"1786233B-BBBF-4B24-939C-A8FCB35283A6"}]}]}],"references":[{"url":"https://bugs.launchpad.net/bugs/1836041","source":"security@ubuntu.com","tags":["Exploit","Issue Tracking","Third Party Advisory"]},{"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11480","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://bugs.launchpad.net/bugs/1836041","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Issue Tracking","Third Party Advisory"]},{"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11480","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}