Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-k9ct-x12b-cfd6
Summarykernel: inotify memory leak
Aliases
0
alias CVE-2010-4250
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.32-71.29.1?arch=el6
purl pkg:rpm/redhat/kernel@2.6.32-71.29.1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1rgx-tmw4-uqgt
1
vulnerability VCID-6b25-pj7t-6ygv
2
vulnerability VCID-75ba-49cu-zuaj
3
vulnerability VCID-88gf-yp5g-kyg4
4
vulnerability VCID-b5ab-aade-4kfw
5
vulnerability VCID-gyye-vwnb-6qeg
6
vulnerability VCID-k9ct-x12b-cfd6
7
vulnerability VCID-paxh-r3cd-cfdu
8
vulnerability VCID-qraj-ye4g-8qdr
9
vulnerability VCID-rh8x-5dz8-tbd6
10
vulnerability VCID-sm7b-9u6f-8bar
11
vulnerability VCID-ydtx-ae9c-eqah
12
vulnerability VCID-yevh-cfer-dud1
13
vulnerability VCID-zedv-xfpx-effg
14
vulnerability VCID-zumd-vknc-87ba
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-71.29.1%3Farch=el6
1
url pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.55?arch=el5rt
purl pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.55?arch=el5rt
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13jv-4raj-3bc6
1
vulnerability VCID-1bhm-5xj1-duh8
2
vulnerability VCID-1d5z-ugrh-s7bj
3
vulnerability VCID-2v2h-1vgg-qubq
4
vulnerability VCID-57xt-prud-ruga
5
vulnerability VCID-6x7p-5tt7-5fdv
6
vulnerability VCID-ccy6-xxzm-vbb4
7
vulnerability VCID-dg9k-nfvc-k7en
8
vulnerability VCID-ek2s-wkm1-4ygb
9
vulnerability VCID-ewd8-ytvq-h7aw
10
vulnerability VCID-gwuw-j14j-dffw
11
vulnerability VCID-k9ct-x12b-cfd6
12
vulnerability VCID-mcdj-296n-1kc9
13
vulnerability VCID-qraj-ye4g-8qdr
14
vulnerability VCID-uk6m-rq4u-nugy
15
vulnerability VCID-uxye-sz24-dqd4
16
vulnerability VCID-xr4s-smmp-fubc
17
vulnerability VCID-ydtx-ae9c-eqah
18
vulnerability VCID-zumd-vknc-87ba
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.55%3Farch=el5rt
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4250.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4250.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4250
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.28003
published_at 2026-04-01T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.28075
published_at 2026-04-02T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.28117
published_at 2026-04-04T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27912
published_at 2026-04-07T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27979
published_at 2026-04-08T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.2802
published_at 2026-04-09T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.28023
published_at 2026-04-11T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.2798
published_at 2026-04-12T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27922
published_at 2026-04-13T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.27933
published_at 2026-04-16T12:55:00Z
10
value 0.00101
scoring_system epss
scoring_elements 0.27915
published_at 2026-04-18T12:55:00Z
11
value 0.00101
scoring_system epss
scoring_elements 0.27872
published_at 2026-04-21T12:55:00Z
12
value 0.00101
scoring_system epss
scoring_elements 0.27787
published_at 2026-04-24T12:55:00Z
13
value 0.00101
scoring_system epss
scoring_elements 0.27675
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4250
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=656830
reference_id 656830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=656830
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35013.c
reference_id CVE-2010-4250;OSVDB-74644
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35013.c
4
reference_url https://www.securityfocus.com/bid/45036/info
reference_id CVE-2010-4250;OSVDB-74644
reference_type exploit
scores
url https://www.securityfocus.com/bid/45036/info
5
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
6
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
7
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
8
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
9
reference_url https://usn.ubuntu.com/1394-1/
reference_id USN-1394-1
reference_type
scores
url https://usn.ubuntu.com/1394-1/
Weaknesses
0
cwe_id 401
name Missing Release of Memory after Effective Lifetime
description The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Exploits
0
date_added 2010-11-24
description Linux Kernel 2.6.x - 'inotify_init()' Memory Leak Local Denial of Service
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2010-11-24
exploit_type dos
platform linux
source_date_updated 2016-09-06
data_source Exploit-DB
source_url https://www.securityfocus.com/bid/45036/info
Severity_range_scorenull
Exploitability2.0
Weighted_severity0.0
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-k9ct-x12b-cfd6