Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-wg43-zbfb-nfaq
Summarykernel: net: Fix memory leak/corruption on VLAN GRO_DROP
Aliases
0
alias CVE-2011-1576
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.18-238.19.1?arch=el5
purl pkg:rpm/redhat/kernel@2.6.18-238.19.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1rgx-tmw4-uqgt
1
vulnerability VCID-4gcp-bfru-57ay
2
vulnerability VCID-8nyx-mdyc-t3ez
3
vulnerability VCID-a9mu-gdgc-cbct
4
vulnerability VCID-au4y-xz41-zyfy
5
vulnerability VCID-dd7k-u8ev-abhz
6
vulnerability VCID-dx7m-ma2j-6ket
7
vulnerability VCID-fhyj-cymx-pfgp
8
vulnerability VCID-j67y-7adf-3ygp
9
vulnerability VCID-ku5j-hkct-aug2
10
vulnerability VCID-nktq-p6vq-hkgq
11
vulnerability VCID-wg43-zbfb-nfaq
12
vulnerability VCID-ydtx-ae9c-eqah
13
vulnerability VCID-yevh-cfer-dud1
14
vulnerability VCID-zumd-vknc-87ba
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-238.19.1%3Farch=el5
1
url pkg:rpm/redhat/kernel@2.6.32-71.34.1?arch=el6
purl pkg:rpm/redhat/kernel@2.6.32-71.34.1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wg43-zbfb-nfaq
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-71.34.1%3Farch=el6
2
url pkg:rpm/redhat/kernel@2.6.32-131.12.1?arch=el6
purl pkg:rpm/redhat/kernel@2.6.32-131.12.1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-58bv-cjnr-3fdh
1
vulnerability VCID-5mpc-pasz-x3hd
2
vulnerability VCID-a9mu-gdgc-cbct
3
vulnerability VCID-au4y-xz41-zyfy
4
vulnerability VCID-c551-3re3-xfat
5
vulnerability VCID-dd7k-u8ev-abhz
6
vulnerability VCID-j67y-7adf-3ygp
7
vulnerability VCID-krvj-487p-auep
8
vulnerability VCID-nktq-p6vq-hkgq
9
vulnerability VCID-s48v-g94e-jkb9
10
vulnerability VCID-s74x-nvav-rud6
11
vulnerability VCID-ssru-1x3c-4qch
12
vulnerability VCID-st8n-ewcq-tqd8
13
vulnerability VCID-wg43-zbfb-nfaq
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-131.12.1%3Farch=el6
3
url pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.75?arch=el6rt
purl pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.75?arch=el6rt
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kqc-mk8b-qyew
1
vulnerability VCID-1n7j-hq91-qqgy
2
vulnerability VCID-37uh-rp8n-sfa2
3
vulnerability VCID-4gcp-bfru-57ay
4
vulnerability VCID-4uay-c8mx-ekdb
5
vulnerability VCID-58bv-cjnr-3fdh
6
vulnerability VCID-5mpc-pasz-x3hd
7
vulnerability VCID-7m3j-x9kb-9ffv
8
vulnerability VCID-91gu-1pgh-jubb
9
vulnerability VCID-9n2b-z8vv-qbec
10
vulnerability VCID-a9mu-gdgc-cbct
11
vulnerability VCID-au4y-xz41-zyfy
12
vulnerability VCID-axbc-ddng-buap
13
vulnerability VCID-c551-3re3-xfat
14
vulnerability VCID-dk3j-jd9m-w3ap
15
vulnerability VCID-dx7m-ma2j-6ket
16
vulnerability VCID-dxqf-acq4-nuca
17
vulnerability VCID-fd7y-6dw5-x7h4
18
vulnerability VCID-fhyj-cymx-pfgp
19
vulnerability VCID-fj3a-gsa8-nug7
20
vulnerability VCID-fqyj-zxer-p3cf
21
vulnerability VCID-h9a4-7v2b-9kg2
22
vulnerability VCID-j67y-7adf-3ygp
23
vulnerability VCID-krvj-487p-auep
24
vulnerability VCID-nktq-p6vq-hkgq
25
vulnerability VCID-peud-25dw-4ud9
26
vulnerability VCID-s48v-g94e-jkb9
27
vulnerability VCID-sn81-psqc-r7de
28
vulnerability VCID-st8n-ewcq-tqd8
29
vulnerability VCID-t54j-wpun-nfcb
30
vulnerability VCID-u5y7-amh6-3uec
31
vulnerability VCID-uvtu-2xmq-jfbw
32
vulnerability VCID-wg43-zbfb-nfaq
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.75%3Farch=el6rt
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1576.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1576.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1576
reference_id
reference_type
scores
0
value 0.00777
scoring_system epss
scoring_elements 0.73574
published_at 2026-04-01T12:55:00Z
1
value 0.00777
scoring_system epss
scoring_elements 0.73582
published_at 2026-04-02T12:55:00Z
2
value 0.00777
scoring_system epss
scoring_elements 0.73606
published_at 2026-04-04T12:55:00Z
3
value 0.00777
scoring_system epss
scoring_elements 0.73579
published_at 2026-04-07T12:55:00Z
4
value 0.00777
scoring_system epss
scoring_elements 0.73615
published_at 2026-04-08T12:55:00Z
5
value 0.00777
scoring_system epss
scoring_elements 0.73628
published_at 2026-04-09T12:55:00Z
6
value 0.00777
scoring_system epss
scoring_elements 0.7365
published_at 2026-04-11T12:55:00Z
7
value 0.00777
scoring_system epss
scoring_elements 0.73632
published_at 2026-04-12T12:55:00Z
8
value 0.00777
scoring_system epss
scoring_elements 0.73623
published_at 2026-04-13T12:55:00Z
9
value 0.00777
scoring_system epss
scoring_elements 0.73667
published_at 2026-04-16T12:55:00Z
10
value 0.00777
scoring_system epss
scoring_elements 0.73676
published_at 2026-04-18T12:55:00Z
11
value 0.00777
scoring_system epss
scoring_elements 0.73668
published_at 2026-04-21T12:55:00Z
12
value 0.00777
scoring_system epss
scoring_elements 0.73701
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1576
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=695173
reference_id 695173
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=695173
3
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
4
reference_url https://access.redhat.com/errata/RHSA-2011:1106
reference_id RHSA-2011:1106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1106
5
reference_url https://access.redhat.com/errata/RHSA-2011:1189
reference_id RHSA-2011:1189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1189
6
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
7
reference_url https://usn.ubuntu.com/1219-1/
reference_id USN-1219-1
reference_type
scores
url https://usn.ubuntu.com/1219-1/
8
reference_url https://usn.ubuntu.com/1220-1/
reference_id USN-1220-1
reference_type
scores
url https://usn.ubuntu.com/1220-1/
9
reference_url https://usn.ubuntu.com/1227-1/
reference_id USN-1227-1
reference_type
scores
url https://usn.ubuntu.com/1227-1/
10
reference_url https://usn.ubuntu.com/1239-1/
reference_id USN-1239-1
reference_type
scores
url https://usn.ubuntu.com/1239-1/
11
reference_url https://usn.ubuntu.com/1240-1/
reference_id USN-1240-1
reference_type
scores
url https://usn.ubuntu.com/1240-1/
12
reference_url https://usn.ubuntu.com/1241-1/
reference_id USN-1241-1
reference_type
scores
url https://usn.ubuntu.com/1241-1/
13
reference_url https://usn.ubuntu.com/1245-1/
reference_id USN-1245-1
reference_type
scores
url https://usn.ubuntu.com/1245-1/
14
reference_url https://usn.ubuntu.com/1253-1/
reference_id USN-1253-1
reference_type
scores
url https://usn.ubuntu.com/1253-1/
15
reference_url https://usn.ubuntu.com/1256-1/
reference_id USN-1256-1
reference_type
scores
url https://usn.ubuntu.com/1256-1/
Weaknesses
0
cwe_id 401
name Missing Release of Memory after Effective Lifetime
description The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Exploits
Severity_range_scorenull
Exploitability0.5
Weighted_severity0.0
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-wg43-zbfb-nfaq