Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-gwuw-j14j-dffw
Summarykernel: posix-cpu-timers: workaround to suppress the problems with mt exec
Aliases
0
alias CVE-2010-4248
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.18-194.32.1?arch=el5
purl pkg:rpm/redhat/kernel@2.6.18-194.32.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2m8w-7whg-jube
1
vulnerability VCID-381s-khqd-muhz
2
vulnerability VCID-3hpq-y376-k3cd
3
vulnerability VCID-6x7p-5tt7-5fdv
4
vulnerability VCID-8fkd-5ked-xyes
5
vulnerability VCID-gwuw-j14j-dffw
6
vulnerability VCID-m6hm-2cau-4fdg
7
vulnerability VCID-nej4-chcw-fqah
8
vulnerability VCID-q4p1-vxct-cybq
9
vulnerability VCID-qx2w-etz4-kybx
10
vulnerability VCID-t5zj-36y8-bbdt
11
vulnerability VCID-ttz3-sqez-7ffq
12
vulnerability VCID-v5g5-3pv6-dqa4
13
vulnerability VCID-vwj3-5b6z-17b1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-194.32.1%3Farch=el5
1
url pkg:rpm/redhat/kernel@2.6.32-71.14.1?arch=el6
purl pkg:rpm/redhat/kernel@2.6.32-71.14.1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13jv-4raj-3bc6
1
vulnerability VCID-1bhm-5xj1-duh8
2
vulnerability VCID-1d5z-ugrh-s7bj
3
vulnerability VCID-22bx-f76m-e3c1
4
vulnerability VCID-2m8w-7whg-jube
5
vulnerability VCID-381s-khqd-muhz
6
vulnerability VCID-3egz-urd4-yfbw
7
vulnerability VCID-519v-6b9u-dygr
8
vulnerability VCID-5754-km4k-ukd3
9
vulnerability VCID-5pu5-muu2-1bf3
10
vulnerability VCID-5x5t-fnw6-kqea
11
vulnerability VCID-643a-mvrh-bbap
12
vulnerability VCID-6x7p-5tt7-5fdv
13
vulnerability VCID-cbze-qxa8-37be
14
vulnerability VCID-cw6b-qbau-hbh7
15
vulnerability VCID-dbrc-nqc1-x3ap
16
vulnerability VCID-ek2s-wkm1-4ygb
17
vulnerability VCID-f744-pabt-7ffu
18
vulnerability VCID-gwuw-j14j-dffw
19
vulnerability VCID-j49x-d5sv-wkek
20
vulnerability VCID-m6hm-2cau-4fdg
21
vulnerability VCID-mcdj-296n-1kc9
22
vulnerability VCID-nej4-chcw-fqah
23
vulnerability VCID-nq55-xn3b-8qdm
24
vulnerability VCID-nub2-qpm7-n7gv
25
vulnerability VCID-pqms-kbb2-wua8
26
vulnerability VCID-rdyv-juby-e3gq
27
vulnerability VCID-sknd-kp51-juec
28
vulnerability VCID-uk6m-rq4u-nugy
29
vulnerability VCID-y21h-7qfs-1kb7
30
vulnerability VCID-zwvt-5gfz-suda
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-71.14.1%3Farch=el6
2
url pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.55?arch=el5rt
purl pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.55?arch=el5rt
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13jv-4raj-3bc6
1
vulnerability VCID-1bhm-5xj1-duh8
2
vulnerability VCID-1d5z-ugrh-s7bj
3
vulnerability VCID-2v2h-1vgg-qubq
4
vulnerability VCID-57xt-prud-ruga
5
vulnerability VCID-6x7p-5tt7-5fdv
6
vulnerability VCID-ccy6-xxzm-vbb4
7
vulnerability VCID-dg9k-nfvc-k7en
8
vulnerability VCID-ek2s-wkm1-4ygb
9
vulnerability VCID-ewd8-ytvq-h7aw
10
vulnerability VCID-gwuw-j14j-dffw
11
vulnerability VCID-k9ct-x12b-cfd6
12
vulnerability VCID-mcdj-296n-1kc9
13
vulnerability VCID-qraj-ye4g-8qdr
14
vulnerability VCID-uk6m-rq4u-nugy
15
vulnerability VCID-uxye-sz24-dqd4
16
vulnerability VCID-xr4s-smmp-fubc
17
vulnerability VCID-ydtx-ae9c-eqah
18
vulnerability VCID-zumd-vknc-87ba
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.55%3Farch=el5rt
References
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0a70217107e6f9844628120412cb27bb4cea194
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0a70217107e6f9844628120412cb27bb4cea194
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4248.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4248.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4248
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.1084
published_at 2026-04-29T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.10909
published_at 2026-04-01T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11047
published_at 2026-04-02T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.11109
published_at 2026-04-04T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-07T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11008
published_at 2026-04-08T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11061
published_at 2026-04-09T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11065
published_at 2026-04-11T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11033
published_at 2026-04-12T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.11011
published_at 2026-04-13T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10865
published_at 2026-04-16T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.10877
published_at 2026-04-18T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.10994
published_at 2026-04-21T12:55:00Z
13
value 0.00037
scoring_system epss
scoring_elements 0.10949
published_at 2026-04-24T12:55:00Z
14
value 0.00037
scoring_system epss
scoring_elements 0.10907
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4248
3
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
4
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
5
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
6
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
7
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
8
reference_url http://www.openwall.com/lists/oss-security/2010/11/23/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/23/2
9
reference_url http://www.openwall.com/lists/oss-security/2010/11/24/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/24/9
10
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
11
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
12
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
13
reference_url http://www.securityfocus.com/bid/45028
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45028
14
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
15
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=656264
reference_id 656264
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=656264
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4248
reference_id CVE-2010-4248
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4248
21
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
22
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
23
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
24
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
25
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
26
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
27
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
28
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
29
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
30
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
31
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
32
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
Weaknesses
0
cwe_id 362
name Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
description The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Exploits
Severity_range_score4.9 - 4.9
Exploitability0.5
Weighted_severity4.4
Risk_score2.2
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-gwuw-j14j-dffw