{"url":"http://public2.vulnerablecode.io/api/packages/127971?format=json","purl":"pkg:rpm/redhat/kernel@2.6.9-89.0.25?arch=EL","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.9-89.0.25","qualifiers":{"arch":"EL"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87885?format=json","vulnerability_id":"VCID-bg6w-edht-bbav","summary":"kernel: information leak via userspace USB interface","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1083.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1083.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1083","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22124","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22282","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2211","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22193","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22247","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22265","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22224","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22164","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22165","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2216","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22115","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21975","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21962","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21949","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1083"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=566624","reference_id":"566624","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=566624"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0394","reference_id":"RHSA-2010:0394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0631","reference_id":"RHSA-2010:0631","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0631"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0723","reference_id":"RHSA-2010:0723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0723"},{"reference_url":"https://usn.ubuntu.com/947-1/","reference_id":"USN-947-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/947-1/"}],"fixed_packages":[],"aliases":["CVE-2010-1083"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bg6w-edht-bbav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87899?format=json","vulnerability_id":"VCID-ekbu-tggg-4beu","summary":"kernel: ALSA: hda-intel: Avoid divide by zero crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1085.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1085","reference_id":"","reference_type":"","scores":[{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.8112","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81128","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81152","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81179","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81204","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81191","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81183","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81221","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81222","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.8122","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.8125","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01508","scoring_system":"epss","scoring_elements":"0.81257","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1085"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=567168","reference_id":"567168","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=567168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0394","reference_id":"RHSA-2010:0394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0398","reference_id":"RHSA-2010:0398","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0398"},{"reference_url":"https://usn.ubuntu.com/947-1/","reference_id":"USN-947-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/947-1/"}],"fixed_packages":[],"aliases":["CVE-2010-1085"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ekbu-tggg-4beu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88773?format=json","vulnerability_id":"VCID-gumm-ayru-3qcd","summary":"kernel: ipv6: skb is unexpectedly freed","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1188.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1188.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1188","reference_id":"","reference_type":"","scores":[{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85877","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85888","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85906","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85908","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85926","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85936","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85951","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85944","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85962","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85966","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85985","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85986","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1188"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=577711","reference_id":"577711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=577711"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0178","reference_id":"RHSA-2010:0178","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0178"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0380","reference_id":"RHSA-2010:0380","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0380"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0394","reference_id":"RHSA-2010:0394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0424","reference_id":"RHSA-2010:0424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0439","reference_id":"RHSA-2010:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0882","reference_id":"RHSA-2010:0882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0882"},{"reference_url":"https://usn.ubuntu.com/947-1/","reference_id":"USN-947-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/947-1/"}],"fixed_packages":[],"aliases":["CVE-2010-1188"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gumm-ayru-3qcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87879?format=json","vulnerability_id":"VCID-mbz8-21ca-4ub6","summary":"kernel: ia64: ptrace: peek_or_poke requests miss ptrace_check_attach()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0729.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0729.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0729","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15036","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15146","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1495","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15037","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15089","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15056","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15018","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14856","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14864","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14955","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14957","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14901","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0729"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=572007","reference_id":"572007","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=572007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0394","reference_id":"RHSA-2010:0394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0394"}],"fixed_packages":[],"aliases":["CVE-2010-0729"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mbz8-21ca-4ub6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87874?format=json","vulnerability_id":"VCID-vg68-e48y-cqer","summary":"kernel: dvb-core: DoS bug in ULE decapsulation code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1086.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1086.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1086","reference_id":"","reference_type":"","scores":[{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81215","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81247","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81246","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81273","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81279","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81286","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81278","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81315","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81317","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81316","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81345","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.8135","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1086"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=569237","reference_id":"569237","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=569237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0394","reference_id":"RHSA-2010:0394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0398","reference_id":"RHSA-2010:0398","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0398"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0631","reference_id":"RHSA-2010:0631","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0631"},{"reference_url":"https://usn.ubuntu.com/947-1/","reference_id":"USN-947-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/947-1/"}],"fixed_packages":[],"aliases":["CVE-2010-1086"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vg68-e48y-cqer"}],"fixing_vulnerabilities":[],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-89.0.25%3Farch=EL"}