{"url":"http://public2.vulnerablecode.io/api/packages/129307?format=json","purl":"pkg:rpm/redhat/kernel@2.4.21-57?arch=EL","type":"rpm","namespace":"redhat","name":"kernel","version":"2.4.21-57","qualifiers":{"arch":"EL"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88470?format=json","vulnerability_id":"VCID-3xs8-97vd-g7ap","summary":"kernel: race condition in dnotify (local DoS, local roothole possible)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1375.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1375.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1375","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21283","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21493","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21244","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21386","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21394","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21354","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21301","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21305","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2128","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21147","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21149","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21124","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1375"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=439754","reference_id":"439754","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=439754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0233","reference_id":"RHSA-2008:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0237","reference_id":"RHSA-2008:0237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0237"},{"reference_url":"https://usn.ubuntu.com/614-1/","reference_id":"USN-614-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/614-1/"},{"reference_url":"https://usn.ubuntu.com/618-1/","reference_id":"USN-618-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/618-1/"}],"fixed_packages":[],"aliases":["CVE-2008-1375"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3xs8-97vd-g7ap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88525?format=json","vulnerability_id":"VCID-6a1a-z32k-3bec","summary":"kernel: insufficient range checks in fault handlers with mremap","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0007.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0007.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0007","reference_id":"","reference_type":"","scores":[{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28955","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2903","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2908","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29004","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28959","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2891","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28934","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28863","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28744","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28633","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28563","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0007"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=428961","reference_id":"428961","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=428961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0233","reference_id":"RHSA-2008:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0237","reference_id":"RHSA-2008:0237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/618-1/","reference_id":"USN-618-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/618-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0007"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6a1a-z32k-3bec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88516?format=json","vulnerability_id":"VCID-9wwp-9dpd-s7he","summary":"Kernel doesn't clear DF for signal handlers","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1367.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1367.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1367","reference_id":"","reference_type":"","scores":[{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88136","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88145","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88161","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88167","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88186","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88192","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88202","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.8896","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88971","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.8897","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88966","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88983","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=437312","reference_id":"437312","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=437312"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465583","reference_id":"465583","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0233","reference_id":"RHSA-2008:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0508","reference_id":"RHSA-2008:0508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0508"}],"fixed_packages":[],"aliases":["CVE-2008-1367"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9wwp-9dpd-s7he"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88570?format=json","vulnerability_id":"VCID-d3j2-c5ey-pqbe","summary":"I4L: fix isdn_ioctl memory issue","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6151.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6151.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6151","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18371","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18519","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1828","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18363","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18416","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18415","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18316","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1826","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18297","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18198","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18182","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18144","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=425111","reference_id":"425111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=425111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0055","reference_id":"RHSA-2008:0055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/574-1/","reference_id":"USN-574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/574-1/"},{"reference_url":"https://usn.ubuntu.com/578-1/","reference_id":"USN-578-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/578-1/"}],"fixed_packages":[],"aliases":["CVE-2007-6151"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d3j2-c5ey-pqbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88785?format=json","vulnerability_id":"VCID-d91v-h4jm-bffj","summary":"kernel Race condition in mincore can cause \"ps -ef\" to hang","references":[{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2008/000023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2008/000023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0014.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4814.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4814.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4814","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25447","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2568","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2575","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25791","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25633","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2569","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25649","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25592","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25594","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25579","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25551","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25503","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25496","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4814"},{"reference_url":"http://secunia.com/advisories/23436","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23436"},{"reference_url":"http://secunia.com/advisories/23609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23609"},{"reference_url":"http://secunia.com/advisories/23997","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23997"},{"reference_url":"http://secunia.com/advisories/24098","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24098"},{"reference_url":"http://secunia.com/advisories/24100","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24100"},{"reference_url":"http://secunia.com/advisories/24206","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24206"},{"reference_url":"http://secunia.com/advisories/24482","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24482"},{"reference_url":"http://secunia.com/advisories/25691","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25691"},{"reference_url":"http://secunia.com/advisories/25714","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25714"},{"reference_url":"http://secunia.com/advisories/29058","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29058"},{"reference_url":"http://secunia.com/advisories/30110","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30110"},{"reference_url":"http://secunia.com/advisories/31246","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31246"},{"reference_url":"http://secunia.com/advisories/33280","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33280"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm"},{"reference_url":"http://www.debian.org/security/2007/dsa-1304","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1304"},{"reference_url":"http://www.debian.org/security/2008/dsa-1503","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1503"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.6","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.6"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:040"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:060","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:060"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_18_kernel.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_18_kernel.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0211.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0211.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0787.html"},{"reference_url":"http://www.securityfocus.com/archive/1/471457","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/471457"},{"reference_url":"http://www.securityfocus.com/bid/21663","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/21663"},{"reference_url":"http://www.trustix.org/errata/2007/0002/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0002/"},{"reference_url":"http://www.ubuntu.com/usn/usn-416-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-416-1"},{"reference_url":"http://www.vupen.com/english/advisories/2006/5082","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/5082"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2222/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2222/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=306971","reference_id":"306971","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=306971"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-4814","reference_id":"CVE-2006-4814","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-4814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0014","reference_id":"RHSA-2007:0014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/416-1/","reference_id":"USN-416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/416-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4814"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d91v-h4jm-bffj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89464?format=json","vulnerability_id":"VCID-dk79-tsxh-jqfa","summary":"Issue with core dump owner","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6206.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6206","reference_id":"","reference_type":"","scores":[{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17483","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17664","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17609","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17617","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17653","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17563","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17539","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17761","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17715","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22872","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22917","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22709","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22785","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22696","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6206"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=396861","reference_id":"396861","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=396861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0055","reference_id":"RHSA-2008:0055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0089","reference_id":"RHSA-2008:0089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0089"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0787","reference_id":"RHSA-2008:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0001","reference_id":"RHSA-2009:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0001"},{"reference_url":"https://usn.ubuntu.com/574-1/","reference_id":"USN-574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/574-1/"},{"reference_url":"https://usn.ubuntu.com/578-1/","reference_id":"USN-578-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/578-1/"}],"fixed_packages":[],"aliases":["CVE-2007-6206"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dk79-tsxh-jqfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88464?format=json","vulnerability_id":"VCID-eb44-v7fv-pfb2","summary":"kernel asynchronous IO on a FIFO kernel panic","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5001.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5001.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5001","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13754","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13848","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13706","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13839","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13808","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13723","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13634","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1363","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13703","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13712","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13681","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13587","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5001"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=326251","reference_id":"326251","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=326251"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"}],"fixed_packages":[],"aliases":["CVE-2007-5001"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eb44-v7fv-pfb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88465?format=json","vulnerability_id":"VCID-weer-a71h-4kes","summary":"kernel: add rcu_read_lock() to fcheck() in both dnotify, locks.c and fix fcntl store/load race in locks.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1669.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1669.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1669","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3087","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30999","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31047","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30865","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30923","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30953","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30956","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30914","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.309","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30846","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30567","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30483","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1669"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=443433","reference_id":"443433","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=443433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0233","reference_id":"RHSA-2008:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0237","reference_id":"RHSA-2008:0237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0237"},{"reference_url":"https://usn.ubuntu.com/614-1/","reference_id":"USN-614-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/614-1/"},{"reference_url":"https://usn.ubuntu.com/618-1/","reference_id":"USN-618-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/618-1/"}],"fixed_packages":[],"aliases":["CVE-2008-1669"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-weer-a71h-4kes"}],"fixing_vulnerabilities":[],"risk_score":"2.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.4.21-57%3Farch=EL"}