Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/129251?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/129251?format=api", "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-74?arch=el5rt", "type": "rpm", "namespace": "redhat", "name": "kernel-rt", "version": "2.6.24.7-74", "qualifiers": { "arch": "el5rt" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88827?format=api", "vulnerability_id": "VCID-2584-pd5b-9bf4", "summary": "kernel: [x86_64] The string instruction version didn't zero the output on exception.", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=3022d734a54cbd2b65eea9a024564821101b4a9a%3Bhp=f0f4c3432e5e1087b3a8c0e6bd4113d3c37497ff", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=3022d734a54cbd2b65eea9a024564821101b4a9a%3Bhp=f0f4c3432e5e1087b3a8c0e6bd4113d3c37497ff" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2008-0508.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2008-0508.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2729.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2729.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2729", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19216", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18932", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19012", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1903", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24947", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24939", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24912", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25014", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25028", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24988", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24934", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2729" }, { "reference_url": "http://secunia.com/advisories/30849", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30849" }, { "reference_url": "http://secunia.com/advisories/30850", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30850" }, { "reference_url": "http://secunia.com/advisories/31107", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31107" }, { "reference_url": "http://secunia.com/advisories/31551", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31551" }, { "reference_url": "http://secunia.com/advisories/31628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31628" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43558" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11571" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1630" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:174", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:174" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0519.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0519.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0585.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0585.html" }, { "reference_url": "http://www.securityfocus.com/bid/29943", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/29943" }, { "reference_url": "http://www.securitytracker.com/id?1020364", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1020364" }, { "reference_url": "http://www.ubuntu.com/usn/usn-625-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-625-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=451271", "reference_id": "451271", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=451271" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2729", "reference_id": "CVE-2008-2729", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0508", "reference_id": "RHSA-2008:0508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0519", "reference_id": "RHSA-2008:0519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585", "reference_id": "RHSA-2008:0585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0585" }, { "reference_url": "https://usn.ubuntu.com/625-1/", "reference_id": "USN-625-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/625-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-2729" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2584-pd5b-9bf4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88522?format=api", "vulnerability_id": "VCID-7f3u-q7tk-h7ac", "summary": "IPSec ESP kernel panics", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6282.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6282.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6282", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02449", "scoring_system": "epss", "scoring_elements": "0.85127", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02449", "scoring_system": "epss", "scoring_elements": "0.85139", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02449", "scoring_system": "epss", "scoring_elements": "0.85156", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02449", "scoring_system": "epss", "scoring_elements": "0.85158", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02449", "scoring_system": "epss", "scoring_elements": "0.8518", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02449", "scoring_system": "epss", "scoring_elements": "0.85188", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02449", "scoring_system": "epss", "scoring_elements": "0.85203", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02449", "scoring_system": "epss", "scoring_elements": "0.852", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02449", "scoring_system": "epss", "scoring_elements": "0.85197", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02449", "scoring_system": "epss", "scoring_elements": "0.85218", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02449", "scoring_system": "epss", "scoring_elements": "0.8522", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6282" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=404291", "reference_id": "404291", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=404291" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0237", "reference_id": "RHSA-2008:0237", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0237" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0275", "reference_id": "RHSA-2008:0275", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0275" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585", "reference_id": "RHSA-2008:0585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0585" }, { "reference_url": "https://usn.ubuntu.com/625-1/", "reference_id": "USN-625-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/625-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2007-6282" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7f3u-q7tk-h7ac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88739?format=api", "vulnerability_id": "VCID-czdd-eft9-vyhj", "summary": "kernel: infinite loop in highres timers (kernel hang)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6712.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6712.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6712", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13573", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13673", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13734", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13536", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13668", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13638", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13601", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13553", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13468", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13463", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13534", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6712" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=439999", "reference_id": "439999", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=439999" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0275", "reference_id": "RHSA-2008:0275", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0275" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585", "reference_id": "RHSA-2008:0585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0585" }, { "reference_url": "https://usn.ubuntu.com/625-1/", "reference_id": "USN-625-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/625-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2007-6712" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-czdd-eft9-vyhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88462?format=api", "vulnerability_id": "VCID-e1fa-s8q2-3fbv", "summary": "kernel: sit memory leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2136.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2136.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2136", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.23487", "scoring_system": "epss", "scoring_elements": "0.95938", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.23487", "scoring_system": "epss", "scoring_elements": "0.95946", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.23487", "scoring_system": "epss", "scoring_elements": "0.95953", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.23487", "scoring_system": "epss", "scoring_elements": "0.95958", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.23487", "scoring_system": "epss", "scoring_elements": "0.95967", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.23487", "scoring_system": "epss", "scoring_elements": "0.9597", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.23487", "scoring_system": "epss", "scoring_elements": "0.95974", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.23487", "scoring_system": "epss", "scoring_elements": "0.95976", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.23487", "scoring_system": "epss", "scoring_elements": "0.95986", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.23487", "scoring_system": "epss", "scoring_elements": "0.95991", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.23487", "scoring_system": "epss", "scoring_elements": "0.95992", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2136" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=446031", "reference_id": "446031", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=446031" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585", "reference_id": "RHSA-2008:0585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0585" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0607", "reference_id": "RHSA-2008:0607", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0607" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0612", "reference_id": "RHSA-2008:0612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0787", "reference_id": "RHSA-2008:0787", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0787" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0973", "reference_id": "RHSA-2008:0973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0001", "reference_id": "RHSA-2009:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0001" }, { "reference_url": "https://usn.ubuntu.com/625-1/", "reference_id": "USN-625-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/625-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-2136" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e1fa-s8q2-3fbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88565?format=api", "vulnerability_id": "VCID-g392-veug-qygm", "summary": "kernel: non-root can trigger cpu_idle soft lockup", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5966.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5966.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5966", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25604", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25676", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25717", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25485", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25558", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25606", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25616", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25575", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25518", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25523", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25507", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25476", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5966" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135", "reference_id": "453135", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585", "reference_id": "RHSA-2008:0585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0585" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1193", "reference_id": "RHSA-2009:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0079", "reference_id": "RHSA-2010:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0079" }, { "reference_url": "https://usn.ubuntu.com/574-1/", "reference_id": "USN-574-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/574-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2007-5966" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g392-veug-qygm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88425?format=api", "vulnerability_id": "VCID-k8uq-hwcd-2fg8", "summary": "kernel: sctp: sctp_getsockopt_local_addrs_old() potential overflow", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=735ce972fbc8a65fb17788debd7bbe7b4383cc62", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=735ce972fbc8a65fb17788debd7bbe7b4383cc62" }, { "reference_url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html" }, { "reference_url": "http://lwn.net/Articles/287350/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lwn.net/Articles/287350/" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2826.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2826.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2826", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35748", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35693", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35891", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35921", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35752", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35801", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35824", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35832", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35791", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35769", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35808", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35797", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2826" }, { "reference_url": "http://secunia.com/advisories/30901", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30901" }, { "reference_url": "http://secunia.com/advisories/31107", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31107" }, { "reference_url": "http://secunia.com/advisories/31202", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31202" }, { "reference_url": "http://secunia.com/advisories/31551", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31551" }, { "reference_url": "http://secunia.com/advisories/31628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31628" }, { "reference_url": "http://secunia.com/advisories/32370", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32370" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43559" }, { "reference_url": "https://issues.rpath.com/browse/RPL-2629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-2629" }, { "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207", "reference_id": "", "reference_type": "", "scores": [], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1630" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.7" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:167", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:167" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:174", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:174" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0585.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0585.html" }, { "reference_url": "http://www.securityfocus.com/bid/29990", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/29990" }, { "reference_url": "http://www.securitytracker.com/id?1020514", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1020514" }, { "reference_url": "http://www.ubuntu.com/usn/usn-625-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-625-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2511", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2511" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=452478", "reference_id": "452478", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452478" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2826", "reference_id": "CVE-2008-2826", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585", "reference_id": "RHSA-2008:0585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0585" }, { "reference_url": "https://usn.ubuntu.com/625-1/", "reference_id": "USN-625-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/625-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-2826" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k8uq-hwcd-2fg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88530?format=api", "vulnerability_id": "VCID-nkbj-56hz-vqfe", "summary": "kernel: ptrace: Unprivileged crash on x86_64 %cs corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1615.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1615.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1615", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19276", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19411", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.1946", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19178", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19256", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2999", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29944", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29912", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29892", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29847", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1615" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431430", "reference_id": "431430", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0237", "reference_id": "RHSA-2008:0237", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0237" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0275", "reference_id": "RHSA-2008:0275", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0275" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585", "reference_id": "RHSA-2008:0585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0585" }, { "reference_url": "https://usn.ubuntu.com/625-1/", "reference_id": "USN-625-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/625-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-1615" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nkbj-56hz-vqfe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88495?format=api", "vulnerability_id": "VCID-q32m-2g35-uubv", "summary": "kernel: fix permission checking in sys_utimensat", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2148.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2148.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2148", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20143", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20291", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20349", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20073", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20154", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20212", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20236", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2019", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20132", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20124", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20129", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20128", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2148" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=455275", "reference_id": "455275", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455275" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585", "reference_id": "RHSA-2008:0585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0585" }, { "reference_url": "https://usn.ubuntu.com/625-1/", "reference_id": "USN-625-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/625-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-2148" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q32m-2g35-uubv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88426?format=api", "vulnerability_id": "VCID-qv5k-g3b6-hfc2", "summary": "kernel: Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89f5b7da2a6bad2e84670422ab8192382a5aeb9f", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89f5b7da2a6bad2e84670422ab8192382a5aeb9f" }, { "reference_url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html" }, { "reference_url": "http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2372.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2372.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2372", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14647", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14737", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14788", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14865", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14668", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14758", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14819", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14777", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1474", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14684", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14578", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14585", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2372" }, { "reference_url": "http://secunia.com/advisories/30901", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30901" }, { "reference_url": "http://secunia.com/advisories/30982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30982" }, { "reference_url": "http://secunia.com/advisories/31202", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31202" }, { "reference_url": "http://secunia.com/advisories/31628", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31628" }, { "reference_url": "http://secunia.com/advisories/32393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32393" }, { "reference_url": "http://secunia.com/advisories/32485", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32485" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43550" }, { "reference_url": "https://issues.rpath.com/browse/RPL-2629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-2629" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9383" }, { "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207", "reference_id": "", "reference_type": "", "scores": [], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0585.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0585.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0957.html" }, { "reference_url": "http://www.ubuntu.com/usn/usn-659-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-659-1" }, { "reference_url": "http://www.ussg.iu.edu/hypermail/linux/kernel/0804.3/3203.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ussg.iu.edu/hypermail/linux/kernel/0804.3/3203.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=452666", "reference_id": "452666", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452666" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2372", "reference_id": "CVE-2008-2372", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0585", "reference_id": "RHSA-2008:0585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0585" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0957", "reference_id": "RHSA-2008:0957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0957" }, { "reference_url": "https://usn.ubuntu.com/659-1/", "reference_id": "USN-659-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/659-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-2372" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qv5k-g3b6-hfc2" } ], "fixing_vulnerabilities": [], "risk_score": "2.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.24.7-74%3Farch=el5rt" }