Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/372829?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/372829?format=api", "purl": "pkg:alpm/archlinux/linux-lts@4.9.60-1", "type": "alpm", "namespace": "archlinux", "name": "linux-lts", "version": "4.9.60-1", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.9.69-1", "latest_non_vulnerable_version": "6.2-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83857?format=api", "vulnerability_id": "VCID-49m3-cmhf-tbeg", "summary": "kernel: Out-of-bounds read in drivers/input/misc/ims-pcu.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16645.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16645.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16645", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12538", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12395", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12593", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12552", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12512", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12416", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1242", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12535", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12543", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12509", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12643", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12685", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12496", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12574", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12625", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16645" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a" }, { "reference_url": "https://groups.google.com/d/msg/syzkaller/q6jjr1OhqO8/WcA99AVFBAAJ", "reference_id": "", "reference_type": "", "scores": [], "url": "https://groups.google.com/d/msg/syzkaller/q6jjr1OhqO8/WcA99AVFBAAJ" }, { "reference_url": "http://www.securityfocus.com/bid/101768", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101768" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516235", "reference_id": "1516235", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516235" }, { "reference_url": "https://security.archlinux.org/AVG-484", "reference_id": "AVG-484", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-484" }, { "reference_url": "https://security.archlinux.org/AVG-568", "reference_id": "AVG-568", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-568" }, { "reference_url": "https://security.archlinux.org/AVG-569", "reference_id": "AVG-569", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-569" }, { "reference_url": "https://security.archlinux.org/AVG-570", "reference_id": "AVG-570", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-570" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16645", "reference_id": "CVE-2017-16645", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16645" }, { "reference_url": "https://usn.ubuntu.com/3617-1/", "reference_id": "USN-3617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-1/" }, { "reference_url": "https://usn.ubuntu.com/3617-2/", "reference_id": "USN-3617-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-2/" }, { "reference_url": "https://usn.ubuntu.com/3617-3/", "reference_id": "USN-3617-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-3/" }, { "reference_url": "https://usn.ubuntu.com/3619-1/", "reference_id": "USN-3619-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-1/" }, { "reference_url": "https://usn.ubuntu.com/3619-2/", "reference_id": "USN-3619-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-2/" }, { "reference_url": "https://usn.ubuntu.com/3754-1/", "reference_id": "USN-3754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372829?format=api", "purl": "pkg:alpm/archlinux/linux-lts@4.9.60-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@4.9.60-1" } ], "aliases": [ "CVE-2017-16645" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-49m3-cmhf-tbeg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83847?format=api", "vulnerability_id": "VCID-55hx-192j-8kfr", "summary": "kernel: Divide-by-zero in drivers/net/usb/cdc_ether.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16649.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16649.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16649", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23734", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23532", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23811", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23767", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.2371", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.2372", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23709", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23688", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23577", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23567", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.2385", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23891", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23679", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23749", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23796", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16649" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ", "reference_id": "", "reference_type": "", "scores": [], "url": "https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html" }, { "reference_url": "https://patchwork.ozlabs.org/patch/834771/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://patchwork.ozlabs.org/patch/834771/" }, { "reference_url": "http://www.securityfocus.com/bid/101761", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101761" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516267", "reference_id": "1516267", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516267" }, { "reference_url": "https://security.archlinux.org/AVG-484", "reference_id": "AVG-484", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-484" }, { "reference_url": "https://security.archlinux.org/AVG-568", "reference_id": "AVG-568", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-568" }, { "reference_url": "https://security.archlinux.org/AVG-569", "reference_id": "AVG-569", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-569" }, { "reference_url": "https://security.archlinux.org/AVG-570", "reference_id": "AVG-570", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-570" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16649", "reference_id": "CVE-2017-16649", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16649" }, { "reference_url": "https://usn.ubuntu.com/3617-1/", "reference_id": "USN-3617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-1/" }, { "reference_url": "https://usn.ubuntu.com/3617-2/", "reference_id": "USN-3617-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-2/" }, { "reference_url": "https://usn.ubuntu.com/3617-3/", "reference_id": "USN-3617-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-3/" }, { "reference_url": "https://usn.ubuntu.com/3619-1/", "reference_id": "USN-3619-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-1/" }, { "reference_url": "https://usn.ubuntu.com/3619-2/", "reference_id": "USN-3619-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-2/" }, { "reference_url": "https://usn.ubuntu.com/3822-1/", "reference_id": "USN-3822-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3822-1/" }, { "reference_url": "https://usn.ubuntu.com/3822-2/", "reference_id": "USN-3822-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3822-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372829?format=api", "purl": "pkg:alpm/archlinux/linux-lts@4.9.60-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@4.9.60-1" } ], "aliases": [ "CVE-2017-16649" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-55hx-192j-8kfr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83903?format=api", "vulnerability_id": "VCID-8c5d-5bub-1ka6", "summary": "kernel: NULL pointer dereference in drivers/net/usb/asix_devices.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16647.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16647.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16647", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24932", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24727", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24952", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24913", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24858", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.2487", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24864", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24841", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24785", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24773", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.25011", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.2505", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24824", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24892", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24937", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16647" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16647", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16647" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://groups.google.com/d/msg/syzkaller/_9a6pd-p_0E/OnmnplQuAgAJ", "reference_id": "", "reference_type": "", "scores": [], "url": "https://groups.google.com/d/msg/syzkaller/_9a6pd-p_0E/OnmnplQuAgAJ" }, { "reference_url": "https://patchwork.ozlabs.org/patch/834686/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://patchwork.ozlabs.org/patch/834686/" }, { "reference_url": "http://www.securityfocus.com/bid/101767", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101767" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516270", "reference_id": "1516270", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516270" }, { "reference_url": "https://security.archlinux.org/AVG-484", "reference_id": "AVG-484", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-484" }, { "reference_url": "https://security.archlinux.org/AVG-568", "reference_id": "AVG-568", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-568" }, { "reference_url": "https://security.archlinux.org/AVG-569", "reference_id": "AVG-569", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-569" }, { "reference_url": "https://security.archlinux.org/AVG-570", "reference_id": "AVG-570", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-570" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16647", "reference_id": "CVE-2017-16647", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16647" }, { "reference_url": "https://usn.ubuntu.com/3617-1/", "reference_id": "USN-3617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-1/" }, { "reference_url": "https://usn.ubuntu.com/3617-2/", "reference_id": "USN-3617-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-2/" }, { "reference_url": "https://usn.ubuntu.com/3617-3/", "reference_id": "USN-3617-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372829?format=api", "purl": "pkg:alpm/archlinux/linux-lts@4.9.60-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@4.9.60-1" } ], "aliases": [ "CVE-2017-16647" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8c5d-5bub-1ka6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83846?format=api", "vulnerability_id": "VCID-rqen-43c7-ebeh", "summary": "kernel: Divide-by-zero in drivers/net/usb/qmi_wwan.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16650.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16650.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16650", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23299", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23131", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23437", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23399", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23346", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23362", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23357", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23337", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23146", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23139", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23473", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.2351", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23294", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23366", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23417", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16650" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16650", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16650" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ", "reference_id": "", "reference_type": "", "scores": [], "url": "https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ" }, { "reference_url": "https://patchwork.ozlabs.org/patch/834770/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://patchwork.ozlabs.org/patch/834770/" }, { "reference_url": "http://www.securityfocus.com/bid/101791", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101791" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516265", "reference_id": "1516265", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516265" }, { "reference_url": "https://security.archlinux.org/AVG-484", "reference_id": "AVG-484", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-484" }, { "reference_url": "https://security.archlinux.org/AVG-568", "reference_id": "AVG-568", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-568" }, { "reference_url": "https://security.archlinux.org/AVG-569", "reference_id": "AVG-569", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-569" }, { "reference_url": "https://security.archlinux.org/AVG-570", "reference_id": "AVG-570", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-570" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16650", "reference_id": "CVE-2017-16650", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16650" }, { "reference_url": "https://usn.ubuntu.com/3617-1/", "reference_id": "USN-3617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-1/" }, { "reference_url": "https://usn.ubuntu.com/3617-2/", "reference_id": "USN-3617-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-2/" }, { "reference_url": "https://usn.ubuntu.com/3617-3/", "reference_id": "USN-3617-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-3/" }, { "reference_url": "https://usn.ubuntu.com/3619-1/", "reference_id": "USN-3619-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-1/" }, { "reference_url": "https://usn.ubuntu.com/3619-2/", "reference_id": "USN-3619-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-2/" }, { "reference_url": "https://usn.ubuntu.com/3754-1/", "reference_id": "USN-3754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372829?format=api", "purl": "pkg:alpm/archlinux/linux-lts@4.9.60-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@4.9.60-1" } ], "aliases": [ "CVE-2017-16650" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rqen-43c7-ebeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83870?format=api", "vulnerability_id": "VCID-s3z2-kzav-1uf9", "summary": "kernel: BUG in drivers/media/usb/dvb-usb/dib0700_devices.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16646.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16646.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16646", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24214", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.23989", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24286", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24244", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24186", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24202", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24189", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24166", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24042", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24031", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24343", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24376", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24159", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24225", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24269", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16646" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16646", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16646" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://groups.google.com/d/msg/syzkaller/-d6ilzbVu_g/OBy8_62mAwAJ", "reference_id": "", "reference_type": "", "scores": [], "url": "https://groups.google.com/d/msg/syzkaller/-d6ilzbVu_g/OBy8_62mAwAJ" }, { "reference_url": "https://patchwork.linuxtv.org/patch/45291/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://patchwork.linuxtv.org/patch/45291/" }, { "reference_url": "http://www.securityfocus.com/bid/101846", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101846" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516272", "reference_id": "1516272", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516272" }, { "reference_url": "https://security.archlinux.org/AVG-484", "reference_id": "AVG-484", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-484" }, { "reference_url": "https://security.archlinux.org/AVG-568", "reference_id": "AVG-568", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-568" }, { "reference_url": "https://security.archlinux.org/AVG-569", "reference_id": "AVG-569", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-569" }, { "reference_url": "https://security.archlinux.org/AVG-570", "reference_id": "AVG-570", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-570" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16646", "reference_id": "CVE-2017-16646", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16646" }, { "reference_url": "https://usn.ubuntu.com/3617-1/", "reference_id": "USN-3617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-1/" }, { "reference_url": "https://usn.ubuntu.com/3617-2/", "reference_id": "USN-3617-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-2/" }, { "reference_url": "https://usn.ubuntu.com/3617-3/", "reference_id": "USN-3617-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-3/" }, { "reference_url": "https://usn.ubuntu.com/3619-1/", "reference_id": "USN-3619-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-1/" }, { "reference_url": "https://usn.ubuntu.com/3619-2/", "reference_id": "USN-3619-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372829?format=api", "purl": "pkg:alpm/archlinux/linux-lts@4.9.60-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@4.9.60-1" } ], "aliases": [ "CVE-2017-16646" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s3z2-kzav-1uf9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83869?format=api", "vulnerability_id": "VCID-tbwt-eez2-6ufm", "summary": "kernel: Use-after-free in drivers/media/dvb-core/dvb_frontend.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16648.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16648.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16648", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16796", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16648", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16819", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16753", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16759", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16793", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16698", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16683", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16965", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1702", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16803", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16892", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1695", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16924", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16648" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://groups.google.com/d/msg/syzkaller/0HJQqTm0G_g/T931ItskBAAJ", "reference_id": "", "reference_type": "", "scores": [], "url": "https://groups.google.com/d/msg/syzkaller/0HJQqTm0G_g/T931ItskBAAJ" }, { "reference_url": "https://patchwork.kernel.org/patch/10046189/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://patchwork.kernel.org/patch/10046189/" }, { "reference_url": "http://www.securityfocus.com/bid/101758", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101758" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516257", "reference_id": "1516257", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516257" }, { "reference_url": "https://security.archlinux.org/AVG-484", "reference_id": "AVG-484", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-484" }, { "reference_url": "https://security.archlinux.org/AVG-568", "reference_id": "AVG-568", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-568" }, { "reference_url": "https://security.archlinux.org/AVG-569", "reference_id": "AVG-569", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-569" }, { "reference_url": "https://security.archlinux.org/AVG-570", "reference_id": "AVG-570", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-570" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16648", "reference_id": "CVE-2017-16648", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16648" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2948", "reference_id": "RHSA-2018:2948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372829?format=api", "purl": "pkg:alpm/archlinux/linux-lts@4.9.60-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@4.9.60-1" } ], "aliases": [ "CVE-2017-16648" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tbwt-eez2-6ufm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83866?format=api", "vulnerability_id": "VCID-xf9m-25qf-bbbq", "summary": "kernel: Out-of-bounds read in drivers/input/tablet/gtco.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16643.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16643.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16643", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09108", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09146", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09202", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0917", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09156", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0905", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09029", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09186", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09231", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09175", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09113", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09166", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09089", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09169", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.092", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16643" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16643", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16643" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/a50829479f58416a013a4ccca791336af3c584c7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/a50829479f58416a013a4ccca791336af3c584c7" }, { "reference_url": "https://groups.google.com/d/msg/syzkaller/McWFcOsA47Y/3bjtBBgaBAAJ", "reference_id": "", "reference_type": "", "scores": [], "url": "https://groups.google.com/d/msg/syzkaller/McWFcOsA47Y/3bjtBBgaBAAJ" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11" }, { "reference_url": "http://www.securityfocus.com/bid/101769", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101769" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516232", "reference_id": "1516232", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516232" }, { "reference_url": "https://security.archlinux.org/AVG-484", "reference_id": "AVG-484", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-484" }, { "reference_url": "https://security.archlinux.org/AVG-568", "reference_id": "AVG-568", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-568" }, { "reference_url": "https://security.archlinux.org/AVG-569", "reference_id": "AVG-569", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-569" }, { "reference_url": "https://security.archlinux.org/AVG-570", "reference_id": "AVG-570", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-570" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16643", "reference_id": "CVE-2017-16643", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16643" }, { "reference_url": "https://usn.ubuntu.com/3507-1/", "reference_id": "USN-3507-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3507-1/" }, { "reference_url": "https://usn.ubuntu.com/3509-1/", "reference_id": "USN-3509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3509-1/" }, { "reference_url": "https://usn.ubuntu.com/3509-2/", "reference_id": "USN-3509-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3509-2/" }, { "reference_url": "https://usn.ubuntu.com/3754-1/", "reference_id": "USN-3754-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3754-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372829?format=api", "purl": "pkg:alpm/archlinux/linux-lts@4.9.60-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@4.9.60-1" } ], "aliases": [ "CVE-2017-16643" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xf9m-25qf-bbbq" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@4.9.60-1" }