{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88426?format=json","vulnerability_id":"VCID-qv5k-g3b6-hfc2","summary":"kernel: Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP","aliases":[{"alias":"CVE-2008-2372"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/128800?format=json","purl":"pkg:rpm/redhat/kernel@2.6.18-92.1.18?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3s7g-w417-u3f7"},{"vulnerability":"VCID-hjz4-81cy-w7az"},{"vulnerability":"VCID-j2ym-frqh-8ugt"},{"vulnerability":"VCID-jcyz-npd9-jugr"},{"vulnerability":"VCID-k2r6-f34x-guge"},{"vulnerability":"VCID-nvjg-9rzb-dufu"},{"vulnerability":"VCID-qv5k-g3b6-hfc2"},{"vulnerability":"VCID-r92j-bk4h-fqdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-92.1.18%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/129251?format=json","purl":"pkg:rpm/redhat/kernel-rt@2.6.24.7-74?arch=el5rt","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2584-pd5b-9bf4"},{"vulnerability":"VCID-7f3u-q7tk-h7ac"},{"vulnerability":"VCID-czdd-eft9-vyhj"},{"vulnerability":"VCID-e1fa-s8q2-3fbv"},{"vulnerability":"VCID-g392-veug-qygm"},{"vulnerability":"VCID-k8uq-hwcd-2fg8"},{"vulnerability":"VCID-nkbj-56hz-vqfe"},{"vulnerability":"VCID-q32m-2g35-uubv"},{"vulnerability":"VCID-qv5k-g3b6-hfc2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.24.7-74%3Farch=el5rt"}],"references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89f5b7da2a6bad2e84670422ab8192382a5aeb9f","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89f5b7da2a6bad2e84670422ab8192382a5aeb9f"},{"reference_url":"http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9","reference_id":"","reference_type":"","scores":[],"url":"http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html"},{"reference_url":"http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html","reference_id":"","reference_type":"","scores":[],"url":"http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2372.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2372.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2372","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14754","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14737","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14788","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14865","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14668","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14758","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14819","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14777","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1474","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14684","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14578","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14647","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14679","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14678","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14614","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14492","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14626","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14716","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14711","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2372"},{"reference_url":"http://secunia.com/advisories/30901","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30901"},{"reference_url":"http://secunia.com/advisories/30982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30982"},{"reference_url":"http://secunia.com/advisories/31202","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31202"},{"reference_url":"http://secunia.com/advisories/31628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31628"},{"reference_url":"http://secunia.com/advisories/32393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32393"},{"reference_url":"http://secunia.com/advisories/32485","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32485"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43550","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43550"},{"reference_url":"https://issues.rpath.com/browse/RPL-2629","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2629"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9383","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9383"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0585.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0585.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0957.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0957.html"},{"reference_url":"http://www.ubuntu.com/usn/usn-659-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-659-1"},{"reference_url":"http://www.ussg.iu.edu/hypermail/linux/kernel/0804.3/3203.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.ussg.iu.edu/hypermail/linux/kernel/0804.3/3203.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=452666","reference_id":"452666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=452666"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2372","reference_id":"CVE-2008-2372","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2372"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0585","reference_id":"RHSA-2008:0585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0957","reference_id":"RHSA-2008:0957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0957"},{"reference_url":"https://usn.ubuntu.com/659-1/","reference_id":"USN-659-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/659-1/"}],"weaknesses":[{"cwe_id":20,"name":"Improper Input Validation","description":"The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly."}],"exploits":[],"severity_range_score":"4.9 - 4.9","exploitability":"0.5","weighted_severity":"4.4","risk_score":2.2,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qv5k-g3b6-hfc2"}