{"url":"http://public2.vulnerablecode.io/api/packages/108765?format=json","purl":"pkg:rpm/redhat/kernel@2.6.32-754?arch=el6","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.32-754","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85755?format=json","vulnerability_id":"VCID-1yjm-d71x-9fh4","summary":"kernel: AIO write triggers integer overflow in some protocols","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4c185ce06dca14f5cea192f5a2c981ef50663f2b","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4c185ce06dca14f5cea192f5a2c981ef50663f2b"},{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4f4b82694fe48b02f7a881a1797131a6dad1364","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4f4b82694fe48b02f7a881a1797131a6dad1364"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8830.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8830","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17849","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17884","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18036","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.182","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18253","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17954","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1804","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.181","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18065","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17957","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17968","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17908","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8830"},{"reference_url":"https://github.com/torvalds/linux/commit/4c185ce06dca14f5cea192f5a2c981ef50663f2b","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/4c185ce06dca14f5cea192f5a2c981ef50663f2b"},{"reference_url":"https://github.com/torvalds/linux/commit/c4f4b82694fe48b02f7a881a1797131a6dad1364","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/c4f4b82694fe48b02f7a881a1797131a6dad1364"},{"reference_url":"http://www.debian.org/security/2016/dsa-3503","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3503"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/03/02/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/03/02/9"},{"reference_url":"http://www.ubuntu.com/usn/USN-2968-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2968-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2968-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2968-2"},{"reference_url":"http://www.ubuntu.com/usn/USN-2969-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2969-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2970-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2970-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314275","reference_id":"1314275","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314275"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8830","reference_id":"CVE-2015-8830","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3083","reference_id":"RHSA-2018:3083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3096","reference_id":"RHSA-2018:3096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3096"},{"reference_url":"https://usn.ubuntu.com/2968-1/","reference_id":"USN-2968-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2968-1/"},{"reference_url":"https://usn.ubuntu.com/2968-2/","reference_id":"USN-2968-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2968-2/"},{"reference_url":"https://usn.ubuntu.com/2969-1/","reference_id":"USN-2969-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2969-1/"},{"reference_url":"https://usn.ubuntu.com/2970-1/","reference_id":"USN-2970-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2970-1/"}],"fixed_packages":[],"aliases":["CVE-2015-8830"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1yjm-d71x-9fh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84481?format=json","vulnerability_id":"VCID-45qw-a51e-8kcp","summary":"kernel: net/packet: overflow in check for priv area size","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7308.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7308.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7308","reference_id":"","reference_type":"","scores":[{"value":"0.87","scoring_system":"epss","scoring_elements":"0.9943","published_at":"2026-04-02T12:55:00Z"},{"value":"0.87","scoring_system":"epss","scoring_elements":"0.99441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.87","scoring_system":"epss","scoring_elements":"0.99437","published_at":"2026-04-13T12:55:00Z"},{"value":"0.87","scoring_system":"epss","scoring_elements":"0.99439","published_at":"2026-04-21T12:55:00Z"},{"value":"0.87","scoring_system":"epss","scoring_elements":"0.9944","published_at":"2026-04-24T12:55:00Z"},{"value":"0.87","scoring_system":"epss","scoring_elements":"0.99432","published_at":"2026-04-07T12:55:00Z"},{"value":"0.87","scoring_system":"epss","scoring_elements":"0.99433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.87","scoring_system":"epss","scoring_elements":"0.99434","published_at":"2026-04-09T12:55:00Z"},{"value":"0.87","scoring_system":"epss","scoring_elements":"0.99435","published_at":"2026-04-11T12:55:00Z"},{"value":"0.87","scoring_system":"epss","scoring_elements":"0.99436","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html","reference_id":"","reference_type":"","scores":[],"url":"https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html"},{"reference_url":"https://patchwork.ozlabs.org/patch/744811/","reference_id":"","reference_type":"","scores":[],"url":"https://patchwork.ozlabs.org/patch/744811/"},{"reference_url":"https://patchwork.ozlabs.org/patch/744812/","reference_id":"","reference_type":"","scores":[],"url":"https://patchwork.ozlabs.org/patch/744812/"},{"reference_url":"https://patchwork.ozlabs.org/patch/744813/","reference_id":"","reference_type":"","scores":[],"url":"https://patchwork.ozlabs.org/patch/744813/"},{"reference_url":"https://source.android.com/security/bulletin/2017-07-01","reference_id":"","reference_type":"","scores":[],"url":"https://source.android.com/security/bulletin/2017-07-01"},{"reference_url":"https://www.exploit-db.com/exploits/41994/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/41994/"},{"reference_url":"https://www.exploit-db.com/exploits/44654/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/44654/"},{"reference_url":"http://www.securityfocus.com/bid/97234","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97234"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1437404","reference_id":"1437404","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1437404"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://github.com/bcoles/kernel-exploits/blob/4a20cca563620340e7abc2bd1e7dca15d5d82e67/CVE-2017-7308/poc.c","reference_id":"CVE-2017-7308","reference_type":"exploit","scores":[],"url":"https://github.com/bcoles/kernel-exploits/blob/4a20cca563620340e7abc2bd1e7dca15d5d82e67/CVE-2017-7308/poc.c"},{"reference_url":"https://github.com/xairy/kernel-exploits/blob/44fcbaafcb2988d3cbfee5d417b17368e15c78bf/CVE-2017-7308/poc.c","reference_id":"CVE-2017-7308","reference_type":"exploit","scores":[],"url":"https://github.com/xairy/kernel-exploits/blob/44fcbaafcb2988d3cbfee5d417b17368e15c78bf/CVE-2017-7308/poc.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41994.c","reference_id":"CVE-2017-7308","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41994.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44654.rb","reference_id":"CVE-2017-7308","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44654.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/47168.c","reference_id":"CVE-2017-7308","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/47168.c"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7308","reference_id":"CVE-2017-7308","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7308"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/6594cbb5ccd3f0b6a3db4300a01491f972ef01c0/modules/exploits/linux/local/af_packet_packet_set_ring_priv_esc.rb","reference_id":"CVE-2017-7308","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/6594cbb5ccd3f0b6a3db4300a01491f972ef01c0/modules/exploits/linux/local/af_packet_packet_set_ring_priv_esc.rb"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1297","reference_id":"RHSA-2017:1297","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1297"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1298","reference_id":"RHSA-2017:1298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1308","reference_id":"RHSA-2017:1308","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1308"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3256-1/","reference_id":"USN-3256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3256-1/"},{"reference_url":"https://usn.ubuntu.com/3256-2/","reference_id":"USN-3256-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3256-2/"}],"fixed_packages":[],"aliases":["CVE-2017-7308"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45qw-a51e-8kcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82840?format=json","vulnerability_id":"VCID-49zh-3frn-pybg","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9076.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9076.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9076","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22222","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22055","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2208","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22067","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2239","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22361","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22381","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2234","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22286","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2228","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22229","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452688","reference_id":"1452688","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452688"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3342-1/","reference_id":"USN-3342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-1/"},{"reference_url":"https://usn.ubuntu.com/3342-2/","reference_id":"USN-3342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-2/"},{"reference_url":"https://usn.ubuntu.com/3343-1/","reference_id":"USN-3343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-1/"},{"reference_url":"https://usn.ubuntu.com/3343-2/","reference_id":"USN-3343-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-2/"},{"reference_url":"https://usn.ubuntu.com/3344-1/","reference_id":"USN-3344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-1/"},{"reference_url":"https://usn.ubuntu.com/3344-2/","reference_id":"USN-3344-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-2/"},{"reference_url":"https://usn.ubuntu.com/3345-1/","reference_id":"USN-3345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3345-1/"}],"fixed_packages":[],"aliases":["CVE-2017-9076"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-49zh-3frn-pybg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82842?format=json","vulnerability_id":"VCID-4brq-uc34-uyb1","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9077.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9077.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9077","reference_id":"","reference_type":"","scores":[{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.7551","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.75601","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.75513","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.75542","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.75523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.75565","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.75576","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00893","scoring_system":"epss","scoring_elements":"0.75581","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76529","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76457","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76489","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76524","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76498","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76502","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452744","reference_id":"1452744","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452744"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3342-1/","reference_id":"USN-3342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-1/"},{"reference_url":"https://usn.ubuntu.com/3342-2/","reference_id":"USN-3342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-2/"},{"reference_url":"https://usn.ubuntu.com/3343-1/","reference_id":"USN-3343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-1/"},{"reference_url":"https://usn.ubuntu.com/3343-2/","reference_id":"USN-3343-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-2/"},{"reference_url":"https://usn.ubuntu.com/3344-1/","reference_id":"USN-3344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-1/"},{"reference_url":"https://usn.ubuntu.com/3344-2/","reference_id":"USN-3344-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-2/"},{"reference_url":"https://usn.ubuntu.com/3345-1/","reference_id":"USN-3345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3345-1/"}],"fixed_packages":[],"aliases":["CVE-2017-9077"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4brq-uc34-uyb1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4149?format=json","vulnerability_id":"VCID-75hg-p8uc-p7ex","summary":"Speculative Store Bypass","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3639.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3639.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3639","reference_id":"","reference_type":"","scores":[{"value":"0.39422","scoring_system":"epss","scoring_elements":"0.97277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.39422","scoring_system":"epss","scoring_elements":"0.97282","published_at":"2026-04-04T12:55:00Z"},{"value":"0.39422","scoring_system":"epss","scoring_elements":"0.97272","published_at":"2026-04-01T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97629","published_at":"2026-04-11T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97631","published_at":"2026-04-12T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97632","published_at":"2026-04-13T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97639","published_at":"2026-04-16T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97641","published_at":"2026-04-24T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97647","published_at":"2026-04-29T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97619","published_at":"2026-04-07T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97624","published_at":"2026-04-08T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97627","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566890","reference_id":"1566890","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566890"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1528","reference_id":"CVE-2018-3639","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/dos/44695.c","reference_id":"CVE-2018-3639","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/dos/44695.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1629","reference_id":"RHSA-2018:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1630","reference_id":"RHSA-2018:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1632","reference_id":"RHSA-2018:1632","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1633","reference_id":"RHSA-2018:1633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1633"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1635","reference_id":"RHSA-2018:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1636","reference_id":"RHSA-2018:1636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1637","reference_id":"RHSA-2018:1637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1638","reference_id":"RHSA-2018:1638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1639","reference_id":"RHSA-2018:1639","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1639"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1640","reference_id":"RHSA-2018:1640","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1640"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1641","reference_id":"RHSA-2018:1641","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1641"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1642","reference_id":"RHSA-2018:1642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1642"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1643","reference_id":"RHSA-2018:1643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1644","reference_id":"RHSA-2018:1644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1644"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1645","reference_id":"RHSA-2018:1645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1645"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1646","reference_id":"RHSA-2018:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1647","reference_id":"RHSA-2018:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1648","reference_id":"RHSA-2018:1648","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1648"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1649","reference_id":"RHSA-2018:1649","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1649"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1650","reference_id":"RHSA-2018:1650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1651","reference_id":"RHSA-2018:1651","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1651"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1652","reference_id":"RHSA-2018:1652","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1652"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1653","reference_id":"RHSA-2018:1653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1654","reference_id":"RHSA-2018:1654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1655","reference_id":"RHSA-2018:1655","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1655"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1656","reference_id":"RHSA-2018:1656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1657","reference_id":"RHSA-2018:1657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1658","reference_id":"RHSA-2018:1658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1659","reference_id":"RHSA-2018:1659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1660","reference_id":"RHSA-2018:1660","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1660"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1661","reference_id":"RHSA-2018:1661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1662","reference_id":"RHSA-2018:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1663","reference_id":"RHSA-2018:1663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1664","reference_id":"RHSA-2018:1664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1665","reference_id":"RHSA-2018:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1666","reference_id":"RHSA-2018:1666","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1667","reference_id":"RHSA-2018:1667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1668","reference_id":"RHSA-2018:1668","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1668"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1669","reference_id":"RHSA-2018:1669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1674","reference_id":"RHSA-2018:1674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1674"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1675","reference_id":"RHSA-2018:1675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1676","reference_id":"RHSA-2018:1676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1686","reference_id":"RHSA-2018:1686","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1686"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1688","reference_id":"RHSA-2018:1688","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1688"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1689","reference_id":"RHSA-2018:1689","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1689"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1690","reference_id":"RHSA-2018:1690","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1696","reference_id":"RHSA-2018:1696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1710","reference_id":"RHSA-2018:1710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1711","reference_id":"RHSA-2018:1711","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1711"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1737","reference_id":"RHSA-2018:1737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1738","reference_id":"RHSA-2018:1738","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1738"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1826","reference_id":"RHSA-2018:1826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1965","reference_id":"RHSA-2018:1965","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1965"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1967","reference_id":"RHSA-2018:1967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1997","reference_id":"RHSA-2018:1997","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1997"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2001","reference_id":"RHSA-2018:2001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2003","reference_id":"RHSA-2018:2003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2006","reference_id":"RHSA-2018:2006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2060","reference_id":"RHSA-2018:2060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2161","reference_id":"RHSA-2018:2161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2162","reference_id":"RHSA-2018:2162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2164","reference_id":"RHSA-2018:2164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2171","reference_id":"RHSA-2018:2171","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2172","reference_id":"RHSA-2018:2172","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2216","reference_id":"RHSA-2018:2216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2216"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2228","reference_id":"RHSA-2018:2228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2246","reference_id":"RHSA-2018:2246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2250","reference_id":"RHSA-2018:2250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2258","reference_id":"RHSA-2018:2258","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2289","reference_id":"RHSA-2018:2289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2309","reference_id":"RHSA-2018:2309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2328","reference_id":"RHSA-2018:2328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2363","reference_id":"RHSA-2018:2363","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2363"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2364","reference_id":"RHSA-2018:2364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2387","reference_id":"RHSA-2018:2387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2394","reference_id":"RHSA-2018:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2396","reference_id":"RHSA-2018:2396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2948","reference_id":"RHSA-2018:2948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3396","reference_id":"RHSA-2018:3396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3397","reference_id":"RHSA-2018:3397","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3397"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3398","reference_id":"RHSA-2018:3398","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3398"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3399","reference_id":"RHSA-2018:3399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3400","reference_id":"RHSA-2018:3400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3400"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3401","reference_id":"RHSA-2018:3401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3401"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3402","reference_id":"RHSA-2018:3402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3407","reference_id":"RHSA-2018:3407","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3407"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3423","reference_id":"RHSA-2018:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3424","reference_id":"RHSA-2018:3424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3425","reference_id":"RHSA-2018:3425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3425"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0148","reference_id":"RHSA-2019:0148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1046","reference_id":"RHSA-2019:1046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1046"},{"reference_url":"https://usn.ubuntu.com/3651-1/","reference_id":"USN-3651-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3651-1/"},{"reference_url":"https://usn.ubuntu.com/3652-1/","reference_id":"USN-3652-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3652-1/"},{"reference_url":"https://usn.ubuntu.com/3653-1/","reference_id":"USN-3653-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3653-1/"},{"reference_url":"https://usn.ubuntu.com/3653-2/","reference_id":"USN-3653-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3653-2/"},{"reference_url":"https://usn.ubuntu.com/3654-1/","reference_id":"USN-3654-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3654-1/"},{"reference_url":"https://usn.ubuntu.com/3654-2/","reference_id":"USN-3654-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3654-2/"},{"reference_url":"https://usn.ubuntu.com/3655-1/","reference_id":"USN-3655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3655-1/"},{"reference_url":"https://usn.ubuntu.com/3655-2/","reference_id":"USN-3655-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3655-2/"},{"reference_url":"https://usn.ubuntu.com/3679-1/","reference_id":"USN-3679-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3679-1/"},{"reference_url":"https://usn.ubuntu.com/3680-1/","reference_id":"USN-3680-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3680-1/"},{"reference_url":"https://usn.ubuntu.com/3756-1/","reference_id":"USN-3756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3756-1/"},{"reference_url":"https://usn.ubuntu.com/3777-3/","reference_id":"USN-3777-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3777-3/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-263.html","reference_id":"XSA-263","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-263.html"}],"fixed_packages":[],"aliases":["CVE-2018-3639","XSA-263"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-75hg-p8uc-p7ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63411?format=json","vulnerability_id":"VCID-8pqu-nssu-7qav","summary":"security update","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4866aa812518ed1a37d8ea0c881dc946409de94","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4866aa812518ed1a37d8ea0c881dc946409de94"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7889.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7889.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7889","reference_id":"","reference_type":"","scores":[{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08918","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08954","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08977","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09024","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08973","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08921","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08971","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08902","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08981","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08975","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08962","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08853","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de94","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/a4866aa812518ed1a37d8ea0c881dc946409de94"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b8f254aa17f720053054c4ecff3920973a83b9d6","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b8f254aa17f720053054c4ecff3920973a83b9d6"},{"reference_url":"http://www.debian.org/security/2017/dsa-3945","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3945"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/04/16/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/04/16/4"},{"reference_url":"http://www.securityfocus.com/bid/97690","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97690"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1444493","reference_id":"1444493","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1444493"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7889","reference_id":"CVE-2017-7889","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3312-1/","reference_id":"USN-3312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-1/"},{"reference_url":"https://usn.ubuntu.com/3312-2/","reference_id":"USN-3312-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-2/"},{"reference_url":"https://usn.ubuntu.com/3314-1/","reference_id":"USN-3314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3314-1/"},{"reference_url":"https://usn.ubuntu.com/3361-1/","reference_id":"USN-3361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3361-1/"},{"reference_url":"https://usn.ubuntu.com/3583-1/","reference_id":"USN-3583-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3583-1/"},{"reference_url":"https://usn.ubuntu.com/3583-2/","reference_id":"USN-3583-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3583-2/"}],"fixed_packages":[],"aliases":["CVE-2017-7889"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8pqu-nssu-7qav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83946?format=json","vulnerability_id":"VCID-a6md-wqt8-cbhh","summary":"kernel: memory leak when merging buffers in SCSI IO vectors","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058"},{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95d78c28b5a85bacbc29b8dba7c04babb9b0d467","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95d78c28b5a85bacbc29b8dba7c04babb9b0d467"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12190.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12190.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12190","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22523","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22782","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22725","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22741","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22736","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22695","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22533","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22525","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25985","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26069","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25878","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25947","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12190"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12190","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12190"},{"reference_url":"http://seclists.org/oss-sec/2017/q4/52","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/oss-sec/2017/q4/52"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:M/C:N/I:N/A:C"},{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058"},{"reference_url":"https://github.com/torvalds/linux/commit/95d78c28b5a85bacbc29b8dba7c04babb9b0d467","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/95d78c28b5a85bacbc29b8dba7c04babb9b0d467"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html"},{"reference_url":"https://support.f5.com/csp/article/K93472064?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K93472064?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8"},{"reference_url":"http://www.securityfocus.com/bid/101911","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101911"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1495089","reference_id":"1495089","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1495089"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12190","reference_id":"CVE-2017-12190","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0654","reference_id":"RHSA-2018:0654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0676","reference_id":"RHSA-2018:0676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1062","reference_id":"RHSA-2018:1062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1170","reference_id":"RHSA-2019:1170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1190","reference_id":"RHSA-2019:1190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1190"},{"reference_url":"https://usn.ubuntu.com/3487-1/","reference_id":"USN-3487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3487-1/"},{"reference_url":"https://usn.ubuntu.com/3582-1/","reference_id":"USN-3582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3582-1/"},{"reference_url":"https://usn.ubuntu.com/3582-2/","reference_id":"USN-3582-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3582-2/"},{"reference_url":"https://usn.ubuntu.com/3583-1/","reference_id":"USN-3583-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3583-1/"},{"reference_url":"https://usn.ubuntu.com/3583-2/","reference_id":"USN-3583-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3583-2/"}],"fixed_packages":[],"aliases":["CVE-2017-12190"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a6md-wqt8-cbhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63461?format=json","vulnerability_id":"VCID-bquu-fuhh-7qha","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5803.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5803.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5803","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18702","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18876","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18765","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18746","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25175","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25261","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25217","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25207","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25289","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5803"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"},{"reference_url":"https://secuniaresearch.flexerasoftware.com/advisories/81331/","reference_id":"","reference_type":"","scores":[],"url":"https://secuniaresearch.flexerasoftware.com/advisories/81331/"},{"reference_url":"https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/","reference_id":"","reference_type":"","scores":[],"url":"https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/"},{"reference_url":"https://www.debian.org/security/2018/dsa-4187","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4187"},{"reference_url":"https://www.debian.org/security/2018/dsa-4188","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4188"},{"reference_url":"https://www.spinics.net/lists/linux-sctp/msg07036.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.spinics.net/lists/linux-sctp/msg07036.html"},{"reference_url":"https://www.spinics.net/lists/netdev/msg482523.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.spinics.net/lists/netdev/msg482523.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1551051","reference_id":"1551051","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1551051"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5803","reference_id":"CVE-2018-5803","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5803"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2948","reference_id":"RHSA-2018:2948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3083","reference_id":"RHSA-2018:3083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3096","reference_id":"RHSA-2018:3096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0641","reference_id":"RHSA-2019:0641","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0641"},{"reference_url":"https://usn.ubuntu.com/3654-1/","reference_id":"USN-3654-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3654-1/"},{"reference_url":"https://usn.ubuntu.com/3654-2/","reference_id":"USN-3654-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3654-2/"},{"reference_url":"https://usn.ubuntu.com/3656-1/","reference_id":"USN-3656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3656-1/"},{"reference_url":"https://usn.ubuntu.com/3697-1/","reference_id":"USN-3697-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3697-1/"},{"reference_url":"https://usn.ubuntu.com/3697-2/","reference_id":"USN-3697-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3697-2/"},{"reference_url":"https://usn.ubuntu.com/3698-1/","reference_id":"USN-3698-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3698-1/"},{"reference_url":"https://usn.ubuntu.com/3698-2/","reference_id":"USN-3698-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3698-2/"}],"fixed_packages":[],"aliases":["CVE-2018-5803"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bquu-fuhh-7qha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83613?format=json","vulnerability_id":"VCID-fbz3-mvsn-b7fu","summary":"kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1130.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1130.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1130","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13999","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13842","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13904","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13936","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1391","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14072","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13931","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14014","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14067","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13984","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13935","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13838","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13832","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1130"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1130"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"},{"reference_url":"https://marc.info/?l=linux-netdev&m=152036596825220&w=2","reference_id":"","reference_type":"","scores":[],"url":"https://marc.info/?l=linux-netdev&m=152036596825220&w=2"},{"reference_url":"https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94","reference_id":"","reference_type":"","scores":[],"url":"https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1576419","reference_id":"1576419","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1576419"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1130","reference_id":"CVE-2018-1130","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3083","reference_id":"RHSA-2018:3083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3096","reference_id":"RHSA-2018:3096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3096"},{"reference_url":"https://usn.ubuntu.com/3654-1/","reference_id":"USN-3654-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3654-1/"},{"reference_url":"https://usn.ubuntu.com/3654-2/","reference_id":"USN-3654-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3654-2/"},{"reference_url":"https://usn.ubuntu.com/3656-1/","reference_id":"USN-3656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3656-1/"},{"reference_url":"https://usn.ubuntu.com/3697-1/","reference_id":"USN-3697-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3697-1/"},{"reference_url":"https://usn.ubuntu.com/3697-2/","reference_id":"USN-3697-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3697-2/"},{"reference_url":"https://usn.ubuntu.com/3698-1/","reference_id":"USN-3698-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3698-1/"},{"reference_url":"https://usn.ubuntu.com/3698-2/","reference_id":"USN-3698-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3698-2/"}],"fixed_packages":[],"aliases":["CVE-2018-1130"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fbz3-mvsn-b7fu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84469?format=json","vulnerability_id":"VCID-h53k-m5pj-83ha","summary":"kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8deb25ccf0ea54d916b8871ae0e62","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8deb25ccf0ea54d916b8871ae0e62"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7616.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7616.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7616","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24002","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24064","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24126","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23951","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24017","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24081","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24037","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.24984","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25072","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25083","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25074","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25046","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.24973","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.24928","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7616"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/cf01fb9985e8deb25ccf0ea54d916b8871ae0e62","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/cf01fb9985e8deb25ccf0ea54d916b8871ae0e62"},{"reference_url":"https://source.android.com/security/bulletin/2017-09-01","reference_id":"","reference_type":"","scores":[],"url":"https://source.android.com/security/bulletin/2017-09-01"},{"reference_url":"http://www.securityfocus.com/bid/97527","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97527"},{"reference_url":"http://www.securitytracker.com/id/1038503","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038503"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441088","reference_id":"1441088","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441088"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7616","reference_id":"CVE-2017-7616","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3291-1/","reference_id":"USN-3291-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3291-1/"},{"reference_url":"https://usn.ubuntu.com/3291-2/","reference_id":"USN-3291-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3291-2/"},{"reference_url":"https://usn.ubuntu.com/3291-3/","reference_id":"USN-3291-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3291-3/"},{"reference_url":"https://usn.ubuntu.com/3293-1/","reference_id":"USN-3293-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3293-1/"},{"reference_url":"https://usn.ubuntu.com/3361-1/","reference_id":"USN-3361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3361-1/"},{"reference_url":"https://usn.ubuntu.com/3406-1/","reference_id":"USN-3406-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3406-1/"},{"reference_url":"https://usn.ubuntu.com/3406-2/","reference_id":"USN-3406-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3406-2/"}],"fixed_packages":[],"aliases":["CVE-2017-7616"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h53k-m5pj-83ha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63449?format=json","vulnerability_id":"VCID-kadh-crsg-vkhg","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18203.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18203.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18203","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16675","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16902","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16686","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16825","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16804","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1676","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16702","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16639","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16646","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16684","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16575","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16541","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550811","reference_id":"1550811","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0676","reference_id":"RHSA-2018:0676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1062","reference_id":"RHSA-2018:1062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4154","reference_id":"RHSA-2019:4154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4154"},{"reference_url":"https://usn.ubuntu.com/3619-1/","reference_id":"USN-3619-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3619-1/"},{"reference_url":"https://usn.ubuntu.com/3619-2/","reference_id":"USN-3619-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3619-2/"},{"reference_url":"https://usn.ubuntu.com/3653-1/","reference_id":"USN-3653-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3653-1/"},{"reference_url":"https://usn.ubuntu.com/3653-2/","reference_id":"USN-3653-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3653-2/"},{"reference_url":"https://usn.ubuntu.com/3655-1/","reference_id":"USN-3655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3655-1/"},{"reference_url":"https://usn.ubuntu.com/3655-2/","reference_id":"USN-3655-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3655-2/"},{"reference_url":"https://usn.ubuntu.com/3657-1/","reference_id":"USN-3657-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3657-1/"}],"fixed_packages":[],"aliases":["CVE-2017-18203"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kadh-crsg-vkhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82832?format=json","vulnerability_id":"VCID-kehv-3zaj-mbhd","summary":"security update","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=657831ffc38e30092a2d5f03d385d710eb88b09a","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=657831ffc38e30092a2d5f03d385d710eb88b09a"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8890.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8890.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8890","reference_id":"","reference_type":"","scores":[{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60865","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60841","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60882","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60871","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.6086","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60873","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64813","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64828","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64845","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64834","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.6472","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64771","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.648","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/657831ffc38e30092a2d5f03d385d710eb88b09a","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/657831ffc38e30092a2d5f03d385d710eb88b09a"},{"reference_url":"https://source.android.com/security/bulletin/2017-09-01","reference_id":"","reference_type":"","scores":[],"url":"https://source.android.com/security/bulletin/2017-09-01"},{"reference_url":"http://www.debian.org/security/2017/dsa-3886","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3886"},{"reference_url":"http://www.securityfocus.com/bid/98562","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98562"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1450972","reference_id":"1450972","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1450972"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8890","reference_id":"CVE-2017-8890","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3342-1/","reference_id":"USN-3342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-1/"},{"reference_url":"https://usn.ubuntu.com/3342-2/","reference_id":"USN-3342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-2/"},{"reference_url":"https://usn.ubuntu.com/3343-1/","reference_id":"USN-3343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-1/"},{"reference_url":"https://usn.ubuntu.com/3343-2/","reference_id":"USN-3343-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-2/"},{"reference_url":"https://usn.ubuntu.com/3344-1/","reference_id":"USN-3344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-1/"},{"reference_url":"https://usn.ubuntu.com/3344-2/","reference_id":"USN-3344-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-2/"},{"reference_url":"https://usn.ubuntu.com/3345-1/","reference_id":"USN-3345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3345-1/"}],"fixed_packages":[],"aliases":["CVE-2017-8890"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kehv-3zaj-mbhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83819?format=json","vulnerability_id":"VCID-kgdm-euqp-8uac","summary":"kernel: vfs: BUG in truncate_inode_pages_range() and fuse client","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15121.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15121.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15121","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21198","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21044","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21217","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21193","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21069","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21349","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21404","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21235","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21297","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21307","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21267","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21213","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21207","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15121"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.f5.com/csp/article/K42142782?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K42142782?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"http://www.securityfocus.com/bid/102128","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102128"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1520893","reference_id":"1520893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1520893"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15121","reference_id":"CVE-2017-15121","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0676","reference_id":"RHSA-2018:0676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1062","reference_id":"RHSA-2018:1062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"}],"fixed_packages":[],"aliases":["CVE-2017-15121"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kgdm-euqp-8uac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84494?format=json","vulnerability_id":"VCID-mpgy-hb3y-1kg8","summary":"kernel: ping socket / AF_LLC connect() sin_family race","references":[{"reference_url":"http://openwall.com/lists/oss-security/2017/04/04/8","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2017/04/04/8"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2671.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2671.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2671","reference_id":"","reference_type":"","scores":[{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49925","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49988","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.5002","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50022","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49994","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49982","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49962","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.4999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49941","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49995","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49989","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.50007","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49979","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49976","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/danieljiang0415/android_kernel_crash_poc","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/danieljiang0415/android_kernel_crash_poc"},{"reference_url":"https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893"},{"reference_url":"https://twitter.com/danieljiang0415/status/845116665184497664","reference_id":"","reference_type":"","scores":[],"url":"https://twitter.com/danieljiang0415/status/845116665184497664"},{"reference_url":"https://www.exploit-db.com/exploits/42135/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/42135/"},{"reference_url":"http://www.securityfocus.com/bid/97407","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97407"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1436649","reference_id":"1436649","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1436649"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://github.com/danieljiang0415/android_kernel_crash_poc/blob/ea761bde605588c9462db09f5bf416559ff32ed4/panic.c","reference_id":"CVE-2017-2671","reference_type":"exploit","scores":[],"url":"https://github.com/danieljiang0415/android_kernel_crash_poc/blob/ea761bde605588c9462db09f5bf416559ff32ed4/panic.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/android/dos/42135.c","reference_id":"CVE-2017-2671","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/android/dos/42135.c"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2671","reference_id":"CVE-2017-2671","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3312-1/","reference_id":"USN-3312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-1/"},{"reference_url":"https://usn.ubuntu.com/3312-2/","reference_id":"USN-3312-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-2/"},{"reference_url":"https://usn.ubuntu.com/3314-1/","reference_id":"USN-3314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3314-1/"},{"reference_url":"https://usn.ubuntu.com/3361-1/","reference_id":"USN-3361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3361-1/"},{"reference_url":"https://usn.ubuntu.com/3754-1/","reference_id":"USN-3754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3754-1/"}],"fixed_packages":[],"aliases":["CVE-2017-2671"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mpgy-hb3y-1kg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87072?format=json","vulnerability_id":"VCID-nrah-gy1h-gffv","summary":"kernel: AIO interface didn't use rw_verify_area() for checking mandatory locking on files and size of access","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a70b52ec1aaeaf60f4739edb1b422827cb6f3893","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a70b52ec1aaeaf60f4739edb1b422827cb6f3893"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6701.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6701.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6701","reference_id":"","reference_type":"","scores":[{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25029","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25085","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25073","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25243","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25325","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25365","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25142","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25211","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.2523","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25176","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25186","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25144","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6701"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/a70b52ec1aaeaf60f4739edb1b422827cb6f3893","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/a70b52ec1aaeaf60f4739edb1b422827cb6f3893"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.1","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/03/02/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/03/02/9"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314288","reference_id":"1314288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314288"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6701","reference_id":"CVE-2012-6701","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"}],"fixed_packages":[],"aliases":["CVE-2012-6701"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nrah-gy1h-gffv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84767?format=json","vulnerability_id":"VCID-pmgn-pun5-xbch","summary":"kernel: Null pointer dereference via keyctl","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8650.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8650.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8650","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13751","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13583","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13708","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13677","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13902","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13704","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13805","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1372","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13631","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13627","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.137","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8650"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1395187","reference_id":"1395187","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1395187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0931","reference_id":"RHSA-2017:0931","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0931"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0932","reference_id":"RHSA-2017:0932","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0932"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0933","reference_id":"RHSA-2017:0933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3422-1/","reference_id":"USN-3422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-1/"},{"reference_url":"https://usn.ubuntu.com/3422-2/","reference_id":"USN-3422-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-2/"}],"fixed_packages":[],"aliases":["CVE-2016-8650"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pmgn-pun5-xbch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82194?format=json","vulnerability_id":"VCID-qmfy-8xcx-b3e6","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6001.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6001.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6001","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30255","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29851","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30107","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30035","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.2992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30284","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30332","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30146","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30241","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30244","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30202","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30154","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3017","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3015","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1422825","reference_id":"1422825","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1422825"},{"reference_url":"https://security.archlinux.org/AVG-187","reference_id":"AVG-187","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-187"},{"reference_url":"https://security.archlinux.org/AVG-188","reference_id":"AVG-188","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3312-1/","reference_id":"USN-3312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-1/"},{"reference_url":"https://usn.ubuntu.com/3312-2/","reference_id":"USN-3312-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-2/"},{"reference_url":"https://usn.ubuntu.com/3361-1/","reference_id":"USN-3361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3361-1/"}],"fixed_packages":[],"aliases":["CVE-2017-6001"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qmfy-8xcx-b3e6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82839?format=json","vulnerability_id":"VCID-xd6f-766q-mkh8","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9075.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9075.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9075","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22222","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22055","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2208","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22067","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2239","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22361","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22381","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2234","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22286","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2228","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22229","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452691","reference_id":"1452691","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452691"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1842","reference_id":"RHSA-2017:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2077","reference_id":"RHSA-2017:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2669","reference_id":"RHSA-2017:2669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://usn.ubuntu.com/3342-1/","reference_id":"USN-3342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-1/"},{"reference_url":"https://usn.ubuntu.com/3342-2/","reference_id":"USN-3342-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3342-2/"},{"reference_url":"https://usn.ubuntu.com/3343-1/","reference_id":"USN-3343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-1/"},{"reference_url":"https://usn.ubuntu.com/3343-2/","reference_id":"USN-3343-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3343-2/"},{"reference_url":"https://usn.ubuntu.com/3344-1/","reference_id":"USN-3344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-1/"},{"reference_url":"https://usn.ubuntu.com/3344-2/","reference_id":"USN-3344-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3344-2/"},{"reference_url":"https://usn.ubuntu.com/3345-1/","reference_id":"USN-3345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3345-1/"}],"fixed_packages":[],"aliases":["CVE-2017-9075"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xd6f-766q-mkh8"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-754%3Farch=el6"}