{"url":"http://public2.vulnerablecode.io/api/packages/128206?format=json","purl":"pkg:rpm/redhat/kernel@2.6.18-164.9.1?arch=el5","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.18-164.9.1","qualifiers":{"arch":"el5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88073?format=json","vulnerability_id":"VCID-9bng-92hg-yygp","summary":"kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3620.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3620","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22052","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22258","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22041","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22176","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22196","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25307","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25298","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25268","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2523","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25174","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=529597","reference_id":"529597","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=529597"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1540","reference_id":"RHSA-2009:1540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1670","reference_id":"RHSA-2009:1670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1671","reference_id":"RHSA-2009:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0882","reference_id":"RHSA-2010:0882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0882"},{"reference_url":"https://usn.ubuntu.com/864-1/","reference_id":"USN-864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/864-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3620"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9bng-92hg-yygp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88023?format=json","vulnerability_id":"VCID-bbc2-2xf7-3kfs","summary":"kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3621.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3621.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3621","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19914","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.2006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19846","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19926","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.1998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.2","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19955","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21897","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21902","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21863","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21716","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21709","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21701","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3621"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=529626","reference_id":"529626","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=529626"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/10022.c","reference_id":"CVE-2009-3621","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/10022.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1540","reference_id":"RHSA-2009:1540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1670","reference_id":"RHSA-2009:1670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1671","reference_id":"RHSA-2009:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1671"},{"reference_url":"https://usn.ubuntu.com/864-1/","reference_id":"USN-864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/864-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3621"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bbc2-2xf7-3kfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88316?format=json","vulnerability_id":"VCID-bscn-juhe-43an","summary":"kernel: nfsv4: kernel panic in nfs4_proc_lock()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3726.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3726.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3726","reference_id":"","reference_type":"","scores":[{"value":"0.05792","scoring_system":"epss","scoring_elements":"0.90462","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05792","scoring_system":"epss","scoring_elements":"0.90467","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05792","scoring_system":"epss","scoring_elements":"0.90478","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05792","scoring_system":"epss","scoring_elements":"0.90484","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05792","scoring_system":"epss","scoring_elements":"0.90496","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05792","scoring_system":"epss","scoring_elements":"0.90502","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05792","scoring_system":"epss","scoring_elements":"0.90509","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05792","scoring_system":"epss","scoring_elements":"0.90503","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05792","scoring_system":"epss","scoring_elements":"0.90521","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05792","scoring_system":"epss","scoring_elements":"0.90519","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05792","scoring_system":"epss","scoring_elements":"0.90531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05792","scoring_system":"epss","scoring_elements":"0.9053","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05792","scoring_system":"epss","scoring_elements":"0.90527","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3726"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=529227","reference_id":"529227","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=529227"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/10202.c","reference_id":"CVE-2009-3726;OSVDB-59877","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/10202.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1635","reference_id":"RHSA-2009:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1670","reference_id":"RHSA-2009:1670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0474","reference_id":"RHSA-2010:0474","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0474"},{"reference_url":"https://usn.ubuntu.com/864-1/","reference_id":"USN-864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/864-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3726"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bscn-juhe-43an"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88032?format=json","vulnerability_id":"VCID-khu8-cdvk-xyhd","summary":"kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3612.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3612.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3612","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21296","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21452","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21258","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21338","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21399","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21408","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22466","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22462","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22413","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22247","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22242","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3612"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=528868","reference_id":"528868","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=528868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1522","reference_id":"RHSA-2009:1522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1540","reference_id":"RHSA-2009:1540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1670","reference_id":"RHSA-2009:1670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1670"},{"reference_url":"https://usn.ubuntu.com/864-1/","reference_id":"USN-864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/864-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3612"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-khu8-cdvk-xyhd"}],"fixing_vulnerabilities":[],"risk_score":"0.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-164.9.1%3Farch=el5"}