{"url":"http://public2.vulnerablecode.io/api/packages/128208?format=json","purl":"pkg:rpm/redhat/kernel@2.6.9-89.0.18?arch=EL","type":"rpm","namespace":"redhat","name":"kernel","version":"2.6.9-89.0.18","qualifiers":{"arch":"EL"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88576?format=json","vulnerability_id":"VCID-2jey-fr36-q7ad","summary":"kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3613.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3613.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3613","reference_id":"","reference_type":"","scores":[{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.89897","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.89901","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.89913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.89918","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.89935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.89941","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.89949","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.89947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.8994","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.89954","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.89955","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.89951","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.89968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.89967","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05211","scoring_system":"epss","scoring_elements":"0.89965","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3613"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=529137","reference_id":"529137","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=529137"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33289.txt","reference_id":"CVE-2009-3613;OSVDB-59068","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33289.txt"},{"reference_url":"https://www.securityfocus.com/bid/36706/info","reference_id":"CVE-2009-3613;OSVDB-59068","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/36706/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1540","reference_id":"RHSA-2009:1540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1548","reference_id":"RHSA-2009:1548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1671","reference_id":"RHSA-2009:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1692","reference_id":"RHSA-2009:1692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1692"},{"reference_url":"https://usn.ubuntu.com/864-1/","reference_id":"USN-864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/864-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3613"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2jey-fr36-q7ad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88073?format=json","vulnerability_id":"VCID-9bng-92hg-yygp","summary":"kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3620.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3620","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22052","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22258","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22041","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22176","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22196","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25307","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25298","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25268","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2523","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25174","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=529597","reference_id":"529597","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=529597"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1540","reference_id":"RHSA-2009:1540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1670","reference_id":"RHSA-2009:1670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1671","reference_id":"RHSA-2009:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0882","reference_id":"RHSA-2010:0882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0882"},{"reference_url":"https://usn.ubuntu.com/864-1/","reference_id":"USN-864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/864-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3620"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9bng-92hg-yygp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88023?format=json","vulnerability_id":"VCID-bbc2-2xf7-3kfs","summary":"kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3621.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3621.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3621","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19914","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.2006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19846","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19926","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.1998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.2","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19955","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21897","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21902","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21863","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21716","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21709","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21701","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3621"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=529626","reference_id":"529626","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=529626"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/10022.c","reference_id":"CVE-2009-3621","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/10022.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1540","reference_id":"RHSA-2009:1540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1670","reference_id":"RHSA-2009:1670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1671","reference_id":"RHSA-2009:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1671"},{"reference_url":"https://usn.ubuntu.com/864-1/","reference_id":"USN-864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/864-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3621"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bbc2-2xf7-3kfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88040?format=json","vulnerability_id":"VCID-c7vw-3qbq-wubw","summary":"kernel: x86_64 32 bit process register leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2910.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2910.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2910","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16185","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16368","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1643","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16227","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16313","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16377","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16359","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16319","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16252","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16188","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16207","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16244","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16135","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16133","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16093","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2910"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526788","reference_id":"526788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526788"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1540","reference_id":"RHSA-2009:1540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1671","reference_id":"RHSA-2009:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0046","reference_id":"RHSA-2010:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0046"},{"reference_url":"https://usn.ubuntu.com/864-1/","reference_id":"USN-864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/864-1/"}],"fixed_packages":[],"aliases":["CVE-2009-2910"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c7vw-3qbq-wubw"}],"fixing_vulnerabilities":[],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-89.0.18%3Farch=EL"}