Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-qv5k-g3b6-hfc2
Summarykernel: Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP
Aliases
0
alias CVE-2008-2372
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.18-92.1.18?arch=el5
purl pkg:rpm/redhat/kernel@2.6.18-92.1.18?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3s7g-w417-u3f7
1
vulnerability VCID-hjz4-81cy-w7az
2
vulnerability VCID-j2ym-frqh-8ugt
3
vulnerability VCID-jcyz-npd9-jugr
4
vulnerability VCID-k2r6-f34x-guge
5
vulnerability VCID-nvjg-9rzb-dufu
6
vulnerability VCID-qv5k-g3b6-hfc2
7
vulnerability VCID-r92j-bk4h-fqdn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-92.1.18%3Farch=el5
1
url pkg:rpm/redhat/kernel-rt@2.6.24.7-74?arch=el5rt
purl pkg:rpm/redhat/kernel-rt@2.6.24.7-74?arch=el5rt
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2584-pd5b-9bf4
1
vulnerability VCID-7f3u-q7tk-h7ac
2
vulnerability VCID-czdd-eft9-vyhj
3
vulnerability VCID-e1fa-s8q2-3fbv
4
vulnerability VCID-g392-veug-qygm
5
vulnerability VCID-k8uq-hwcd-2fg8
6
vulnerability VCID-nkbj-56hz-vqfe
7
vulnerability VCID-q32m-2g35-uubv
8
vulnerability VCID-qv5k-g3b6-hfc2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.24.7-74%3Farch=el5rt
References
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89f5b7da2a6bad2e84670422ab8192382a5aeb9f
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89f5b7da2a6bad2e84670422ab8192382a5aeb9f
1
reference_url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9
reference_id
reference_type
scores
url http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html
5
reference_url http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html
reference_id
reference_type
scores
url http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2372.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2372.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2372
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14626
published_at 2026-05-07T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14737
published_at 2026-04-01T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14788
published_at 2026-04-02T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14865
published_at 2026-04-04T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14668
published_at 2026-04-07T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14758
published_at 2026-04-08T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14819
published_at 2026-04-09T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14777
published_at 2026-04-11T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.1474
published_at 2026-04-12T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14684
published_at 2026-04-13T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14578
published_at 2026-04-16T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14585
published_at 2026-04-18T12:55:00Z
12
value 0.00048
scoring_system epss
scoring_elements 0.14647
published_at 2026-04-21T12:55:00Z
13
value 0.00048
scoring_system epss
scoring_elements 0.14679
published_at 2026-04-24T12:55:00Z
14
value 0.00048
scoring_system epss
scoring_elements 0.14678
published_at 2026-04-26T12:55:00Z
15
value 0.00048
scoring_system epss
scoring_elements 0.14614
published_at 2026-04-29T12:55:00Z
16
value 0.00048
scoring_system epss
scoring_elements 0.14492
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2372
8
reference_url http://secunia.com/advisories/30901
reference_id
reference_type
scores
url http://secunia.com/advisories/30901
9
reference_url http://secunia.com/advisories/30982
reference_id
reference_type
scores
url http://secunia.com/advisories/30982
10
reference_url http://secunia.com/advisories/31202
reference_id
reference_type
scores
url http://secunia.com/advisories/31202
11
reference_url http://secunia.com/advisories/31628
reference_id
reference_type
scores
url http://secunia.com/advisories/31628
12
reference_url http://secunia.com/advisories/32393
reference_id
reference_type
scores
url http://secunia.com/advisories/32393
13
reference_url http://secunia.com/advisories/32485
reference_id
reference_type
scores
url http://secunia.com/advisories/32485
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43550
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43550
15
reference_url https://issues.rpath.com/browse/RPL-2629
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2629
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9383
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9383
17
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207
18
reference_url http://www.redhat.com/support/errata/RHSA-2008-0585.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0585.html
19
reference_url http://www.redhat.com/support/errata/RHSA-2008-0957.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0957.html
20
reference_url http://www.ubuntu.com/usn/usn-659-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-659-1
21
reference_url http://www.ussg.iu.edu/hypermail/linux/kernel/0804.3/3203.html
reference_id
reference_type
scores
url http://www.ussg.iu.edu/hypermail/linux/kernel/0804.3/3203.html
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=452666
reference_id 452666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=452666
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2372
reference_id CVE-2008-2372
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-2372
34
reference_url https://access.redhat.com/errata/RHSA-2008:0585
reference_id RHSA-2008:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0585
35
reference_url https://access.redhat.com/errata/RHSA-2008:0957
reference_id RHSA-2008:0957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0957
36
reference_url https://usn.ubuntu.com/659-1/
reference_id USN-659-1
reference_type
scores
url https://usn.ubuntu.com/659-1/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score4.9 - 4.9
Exploitability0.5
Weighted_severity4.4
Risk_score2.2
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-qv5k-g3b6-hfc2