Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-qrt5-vdfy-k3eb
Summarykernel: drm: integer overflow in drm_mode_dirtyfb_ioctl()
Aliases
0
alias CVE-2012-0044
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.32-131.29.1?arch=el6
purl pkg:rpm/redhat/kernel@2.6.32-131.29.1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13ek-v7ng-5khn
1
vulnerability VCID-c6wb-wxwr-tuh3
2
vulnerability VCID-dzp6-pjj8-ruhf
3
vulnerability VCID-qatp-fv4f-tugw
4
vulnerability VCID-qrt5-vdfy-k3eb
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-131.29.1%3Farch=el6
1
url pkg:rpm/redhat/kernel@2.6.32-220.23.1?arch=el6
purl pkg:rpm/redhat/kernel@2.6.32-220.23.1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-486y-9v9t-x3hx
1
vulnerability VCID-aszd-q4dg-bbgw
2
vulnerability VCID-cae1-x9uv-c3fu
3
vulnerability VCID-cz7k-mjp3-g3hn
4
vulnerability VCID-dzp6-pjj8-ruhf
5
vulnerability VCID-n2hd-pete-vka3
6
vulnerability VCID-qrt5-vdfy-k3eb
7
vulnerability VCID-ushy-m8mj-qbe6
8
vulnerability VCID-xgu5-vemd-jqh6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-220.23.1%3Farch=el6
2
url pkg:rpm/redhat/kernel-rt@3.0.18-rt34.53?arch=el6rt
purl pkg:rpm/redhat/kernel-rt@3.0.18-rt34.53?arch=el6rt
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qpn-v9pw-vbgs
1
vulnerability VCID-5bkg-wjsx-zucw
2
vulnerability VCID-6y6m-dsht-y7d8
3
vulnerability VCID-8uu6-qhdz-qqff
4
vulnerability VCID-9a7h-rc7a-kufu
5
vulnerability VCID-c6wb-wxwr-tuh3
6
vulnerability VCID-pevh-sj6y-gqdp
7
vulnerability VCID-qdds-66x8-gqdb
8
vulnerability VCID-qrt5-vdfy-k3eb
9
vulnerability VCID-rjeq-4es3-g3dg
10
vulnerability VCID-vjgt-vg3s-fbaa
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.0.18-rt34.53%3Farch=el6rt
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0044.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0044.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0044
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14915
published_at 2026-04-01T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14963
published_at 2026-04-02T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.1504
published_at 2026-04-04T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14845
published_at 2026-04-07T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17597
published_at 2026-04-08T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17659
published_at 2026-04-09T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17677
published_at 2026-04-11T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.1763
published_at 2026-04-12T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17578
published_at 2026-04-13T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17524
published_at 2026-04-16T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17532
published_at 2026-04-18T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17566
published_at 2026-04-21T12:55:00Z
12
value 0.00056
scoring_system epss
scoring_elements 0.17476
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0044
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=772894
reference_id 772894
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=772894
3
reference_url https://access.redhat.com/errata/RHSA-2012:0333
reference_id RHSA-2012:0333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0333
4
reference_url https://access.redhat.com/errata/RHSA-2012:0743
reference_id RHSA-2012:0743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0743
5
reference_url https://access.redhat.com/errata/RHSA-2012:1042
reference_id RHSA-2012:1042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1042
6
reference_url https://usn.ubuntu.com/1330-1/
reference_id USN-1330-1
reference_type
scores
url https://usn.ubuntu.com/1330-1/
7
reference_url https://usn.ubuntu.com/1336-1/
reference_id USN-1336-1
reference_type
scores
url https://usn.ubuntu.com/1336-1/
8
reference_url https://usn.ubuntu.com/1340-1/
reference_id USN-1340-1
reference_type
scores
url https://usn.ubuntu.com/1340-1/
9
reference_url https://usn.ubuntu.com/1356-1/
reference_id USN-1356-1
reference_type
scores
url https://usn.ubuntu.com/1356-1/
10
reference_url https://usn.ubuntu.com/1361-1/
reference_id USN-1361-1
reference_type
scores
url https://usn.ubuntu.com/1361-1/
11
reference_url https://usn.ubuntu.com/1362-1/
reference_id USN-1362-1
reference_type
scores
url https://usn.ubuntu.com/1362-1/
12
reference_url https://usn.ubuntu.com/1386-1/
reference_id USN-1386-1
reference_type
scores
url https://usn.ubuntu.com/1386-1/
13
reference_url https://usn.ubuntu.com/1387-1/
reference_id USN-1387-1
reference_type
scores
url https://usn.ubuntu.com/1387-1/
14
reference_url https://usn.ubuntu.com/1394-1/
reference_id USN-1394-1
reference_type
scores
url https://usn.ubuntu.com/1394-1/
15
reference_url https://usn.ubuntu.com/1555-1/
reference_id USN-1555-1
reference_type
scores
url https://usn.ubuntu.com/1555-1/
16
reference_url https://usn.ubuntu.com/1556-1/
reference_id USN-1556-1
reference_type
scores
url https://usn.ubuntu.com/1556-1/
Weaknesses
0
cwe_id 190
name Integer Overflow or Wraparound
description The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Exploits
Severity_range_scorenull
Exploitability0.5
Weighted_severity0.0
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-qrt5-vdfy-k3eb