{"url":"http://public2.vulnerablecode.io/api/packages/113507?format=json","purl":"pkg:rpm/redhat/kernel@3.10.0-514.10.2?arch=el7","type":"rpm","namespace":"redhat","name":"kernel","version":"3.10.0-514.10.2","qualifiers":{"arch":"el7"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84701?format=json","vulnerability_id":"VCID-3m2e-pzkb-3kct","summary":"kernel: Race condition in packet_set_ring leads to use after free","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8655.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8655.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8655","reference_id":"","reference_type":"","scores":[{"value":"0.34922","scoring_system":"epss","scoring_elements":"0.97044","published_at":"2026-04-29T12:55:00Z"},{"value":"0.34922","scoring_system":"epss","scoring_elements":"0.97035","published_at":"2026-04-18T12:55:00Z"},{"value":"0.34922","scoring_system":"epss","scoring_elements":"0.97039","published_at":"2026-04-21T12:55:00Z"},{"value":"0.34922","scoring_system":"epss","scoring_elements":"0.97041","published_at":"2026-04-24T12:55:00Z"},{"value":"0.34922","scoring_system":"epss","scoring_elements":"0.97043","published_at":"2026-04-26T12:55:00Z"},{"value":"0.38274","scoring_system":"epss","scoring_elements":"0.97207","published_at":"2026-04-02T12:55:00Z"},{"value":"0.38274","scoring_system":"epss","scoring_elements":"0.97212","published_at":"2026-04-04T12:55:00Z"},{"value":"0.38274","scoring_system":"epss","scoring_elements":"0.97213","published_at":"2026-04-07T12:55:00Z"},{"value":"0.38274","scoring_system":"epss","scoring_elements":"0.97223","published_at":"2026-04-09T12:55:00Z"},{"value":"0.38274","scoring_system":"epss","scoring_elements":"0.97227","published_at":"2026-04-11T12:55:00Z"},{"value":"0.38274","scoring_system":"epss","scoring_elements":"0.97228","published_at":"2026-04-13T12:55:00Z"},{"value":"0.38274","scoring_system":"epss","scoring_elements":"0.97237","published_at":"2026-04-16T12:55:00Z"},{"value":"0.38274","scoring_system":"epss","scoring_elements":"0.972","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1400019","reference_id":"1400019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1400019"},{"reference_url":"https://security.archlinux.org/ASA-201612-6","reference_id":"ASA-201612-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201612-6"},{"reference_url":"https://security.archlinux.org/ASA-201612-7","reference_id":"ASA-201612-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201612-7"},{"reference_url":"https://security.archlinux.org/ASA-201612-8","reference_id":"ASA-201612-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201612-8"},{"reference_url":"https://security.archlinux.org/AVG-95","reference_id":"AVG-95","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-95"},{"reference_url":"https://security.archlinux.org/AVG-96","reference_id":"AVG-96","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-96"},{"reference_url":"https://security.archlinux.org/AVG-98","reference_id":"AVG-98","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-98"},{"reference_url":"http://seclists.org/oss-sec/2016/q4/607","reference_id":"CVE-2016-8655","reference_type":"exploit","scores":[],"url":"http://seclists.org/oss-sec/2016/q4/607"},{"reference_url":"https://github.com/bcoles/kernel-exploits/blob/4a20cca563620340e7abc2bd1e7dca15d5d82e67/CVE-2016-8655/chocobo_root.c","reference_id":"CVE-2016-8655","reference_type":"exploit","scores":[],"url":"https://github.com/bcoles/kernel-exploits/blob/4a20cca563620340e7abc2bd1e7dca15d5d82e67/CVE-2016-8655/chocobo_root.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44696.rb","reference_id":"CVE-2016-8655","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44696.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/40871.c","reference_id":"CVE-2016-8655","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/40871.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/47170.c","reference_id":"CVE-2016-8655","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/47170.c"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/88ab836e15dc5da85050b99910861cd10778c882/modules/exploits/linux/local/af_packet_chocobo_root_priv_esc.rb","reference_id":"CVE-2016-8655","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/88ab836e15dc5da85050b99910861cd10778c882/modules/exploits/linux/local/af_packet_chocobo_root_priv_esc.rb"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0386","reference_id":"RHSA-2017:0386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0387","reference_id":"RHSA-2017:0387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0402","reference_id":"RHSA-2017:0402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0402"},{"reference_url":"https://usn.ubuntu.com/3149-1/","reference_id":"USN-3149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3149-1/"},{"reference_url":"https://usn.ubuntu.com/3149-2/","reference_id":"USN-3149-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3149-2/"},{"reference_url":"https://usn.ubuntu.com/3150-1/","reference_id":"USN-3150-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3150-1/"},{"reference_url":"https://usn.ubuntu.com/3150-2/","reference_id":"USN-3150-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3150-2/"},{"reference_url":"https://usn.ubuntu.com/3151-1/","reference_id":"USN-3151-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3151-1/"},{"reference_url":"https://usn.ubuntu.com/3151-2/","reference_id":"USN-3151-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3151-2/"},{"reference_url":"https://usn.ubuntu.com/3151-3/","reference_id":"USN-3151-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3151-3/"},{"reference_url":"https://usn.ubuntu.com/3151-4/","reference_id":"USN-3151-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3151-4/"},{"reference_url":"https://usn.ubuntu.com/3152-1/","reference_id":"USN-3152-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3152-1/"},{"reference_url":"https://usn.ubuntu.com/3152-2/","reference_id":"USN-3152-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3152-2/"}],"fixed_packages":[],"aliases":["CVE-2016-8655"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3m2e-pzkb-3kct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84852?format=json","vulnerability_id":"VCID-4fxd-fxb3-9fgf","summary":"kernel: State machine confusion bug in vfio driver leading to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9083.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9083.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9083","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14698","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14748","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14823","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14716","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14776","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14736","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14645","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14537","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14543","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14607","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14638","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14635","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14574","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1389258","reference_id":"1389258","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1389258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0386","reference_id":"RHSA-2017:0386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0387","reference_id":"RHSA-2017:0387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0387"},{"reference_url":"https://usn.ubuntu.com/3312-1/","reference_id":"USN-3312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-1/"},{"reference_url":"https://usn.ubuntu.com/3312-2/","reference_id":"USN-3312-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-2/"},{"reference_url":"https://usn.ubuntu.com/3361-1/","reference_id":"USN-3361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3361-1/"},{"reference_url":"https://usn.ubuntu.com/3422-1/","reference_id":"USN-3422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-1/"},{"reference_url":"https://usn.ubuntu.com/3422-2/","reference_id":"USN-3422-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-2/"}],"fixed_packages":[],"aliases":["CVE-2016-9083"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4fxd-fxb3-9fgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84801?format=json","vulnerability_id":"VCID-b9n6-363a-pqgj","summary":"kernel: kvm: x86: NULL pointer dereference during instruction decode","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8630.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8630.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8630","reference_id":"","reference_type":"","scores":[{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08671","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08737","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.0878","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08734","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08747","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08672","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08748","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08753","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08738","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08626","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08615","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08768","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8630"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"},{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1393350","reference_id":"1393350","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1393350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0386","reference_id":"RHSA-2017:0386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0387","reference_id":"RHSA-2017:0387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0387"},{"reference_url":"https://usn.ubuntu.com/3161-1/","reference_id":"USN-3161-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3161-1/"},{"reference_url":"https://usn.ubuntu.com/3161-2/","reference_id":"USN-3161-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3161-2/"},{"reference_url":"https://usn.ubuntu.com/3161-3/","reference_id":"USN-3161-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3161-3/"},{"reference_url":"https://usn.ubuntu.com/3161-4/","reference_id":"USN-3161-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3161-4/"},{"reference_url":"https://usn.ubuntu.com/3162-1/","reference_id":"USN-3162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3162-1/"},{"reference_url":"https://usn.ubuntu.com/3162-2/","reference_id":"USN-3162-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3162-2/"}],"fixed_packages":[],"aliases":["CVE-2016-8630"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b9n6-363a-pqgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84853?format=json","vulnerability_id":"VCID-qgte-zhf5-jbak","summary":"kernel: Integer overflow when using kzalloc in vfio driver","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9084.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9084.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9084","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15774","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15843","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15709","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15794","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15854","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15833","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15797","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15727","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15648","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15657","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15703","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1572","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15716","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15659","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9084"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1389259","reference_id":"1389259","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1389259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0386","reference_id":"RHSA-2017:0386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0387","reference_id":"RHSA-2017:0387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0387"},{"reference_url":"https://usn.ubuntu.com/3312-1/","reference_id":"USN-3312-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-1/"},{"reference_url":"https://usn.ubuntu.com/3312-2/","reference_id":"USN-3312-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3312-2/"},{"reference_url":"https://usn.ubuntu.com/3361-1/","reference_id":"USN-3361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3361-1/"},{"reference_url":"https://usn.ubuntu.com/3422-1/","reference_id":"USN-3422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-1/"},{"reference_url":"https://usn.ubuntu.com/3422-2/","reference_id":"USN-3422-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3422-2/"}],"fixed_packages":[],"aliases":["CVE-2016-9084"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qgte-zhf5-jbak"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-514.10.2%3Farch=el7"}