Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-s48v-g94e-jkb9
Summarykernel: rpc task leak after flock()ing NFS share
Aliases
0
alias CVE-2011-2491
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.18-238.31.1?arch=el5
purl pkg:rpm/redhat/kernel@2.6.18-238.31.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-39rw-6kba-zfh4
1
vulnerability VCID-5mpc-pasz-x3hd
2
vulnerability VCID-s48v-g94e-jkb9
3
vulnerability VCID-st8n-ewcq-tqd8
4
vulnerability VCID-wc2m-xbsh-xkb9
5
vulnerability VCID-wgmf-2zuh-z3fn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-238.31.1%3Farch=el5
1
url pkg:rpm/redhat/kernel@2.6.18-274.3.1?arch=el5
purl pkg:rpm/redhat/kernel@2.6.18-274.3.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-39rw-6kba-zfh4
1
vulnerability VCID-5mpc-pasz-x3hd
2
vulnerability VCID-s48v-g94e-jkb9
3
vulnerability VCID-st8n-ewcq-tqd8
4
vulnerability VCID-wc2m-xbsh-xkb9
5
vulnerability VCID-wgmf-2zuh-z3fn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-274.3.1%3Farch=el5
2
url pkg:rpm/redhat/kernel@2.6.32-131.12.1?arch=el6
purl pkg:rpm/redhat/kernel@2.6.32-131.12.1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-58bv-cjnr-3fdh
1
vulnerability VCID-5mpc-pasz-x3hd
2
vulnerability VCID-a9mu-gdgc-cbct
3
vulnerability VCID-au4y-xz41-zyfy
4
vulnerability VCID-c551-3re3-xfat
5
vulnerability VCID-dd7k-u8ev-abhz
6
vulnerability VCID-j67y-7adf-3ygp
7
vulnerability VCID-krvj-487p-auep
8
vulnerability VCID-nktq-p6vq-hkgq
9
vulnerability VCID-s48v-g94e-jkb9
10
vulnerability VCID-s74x-nvav-rud6
11
vulnerability VCID-ssru-1x3c-4qch
12
vulnerability VCID-st8n-ewcq-tqd8
13
vulnerability VCID-wg43-zbfb-nfaq
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-131.12.1%3Farch=el6
3
url pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.75?arch=el6rt
purl pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.75?arch=el6rt
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kqc-mk8b-qyew
1
vulnerability VCID-1n7j-hq91-qqgy
2
vulnerability VCID-37uh-rp8n-sfa2
3
vulnerability VCID-4gcp-bfru-57ay
4
vulnerability VCID-4uay-c8mx-ekdb
5
vulnerability VCID-58bv-cjnr-3fdh
6
vulnerability VCID-5mpc-pasz-x3hd
7
vulnerability VCID-7m3j-x9kb-9ffv
8
vulnerability VCID-91gu-1pgh-jubb
9
vulnerability VCID-9n2b-z8vv-qbec
10
vulnerability VCID-a9mu-gdgc-cbct
11
vulnerability VCID-au4y-xz41-zyfy
12
vulnerability VCID-axbc-ddng-buap
13
vulnerability VCID-c551-3re3-xfat
14
vulnerability VCID-dk3j-jd9m-w3ap
15
vulnerability VCID-dx7m-ma2j-6ket
16
vulnerability VCID-dxqf-acq4-nuca
17
vulnerability VCID-fd7y-6dw5-x7h4
18
vulnerability VCID-fhyj-cymx-pfgp
19
vulnerability VCID-fj3a-gsa8-nug7
20
vulnerability VCID-fqyj-zxer-p3cf
21
vulnerability VCID-h9a4-7v2b-9kg2
22
vulnerability VCID-j67y-7adf-3ygp
23
vulnerability VCID-krvj-487p-auep
24
vulnerability VCID-nktq-p6vq-hkgq
25
vulnerability VCID-peud-25dw-4ud9
26
vulnerability VCID-s48v-g94e-jkb9
27
vulnerability VCID-sn81-psqc-r7de
28
vulnerability VCID-st8n-ewcq-tqd8
29
vulnerability VCID-t54j-wpun-nfcb
30
vulnerability VCID-u5y7-amh6-3uec
31
vulnerability VCID-uvtu-2xmq-jfbw
32
vulnerability VCID-wg43-zbfb-nfaq
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.75%3Farch=el6rt
References
0
reference_url http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0
reference_id
reference_type
scores
url http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b760113a3a155269a3fba93a409c640031dd68f
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b760113a3a155269a3fba93a409c640031dd68f
2
reference_url http://rhn.redhat.com/errata/RHSA-2011-1212.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-1212.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2491.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2491.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2491
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20642
published_at 2026-04-24T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20809
published_at 2026-04-01T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20957
published_at 2026-04-02T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.21016
published_at 2026-04-04T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20732
published_at 2026-04-07T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-08T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20871
published_at 2026-04-09T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20887
published_at 2026-04-11T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20844
published_at 2026-04-12T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20791
published_at 2026-04-13T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20781
published_at 2026-04-16T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20774
published_at 2026-04-18T12:55:00Z
12
value 0.00067
scoring_system epss
scoring_elements 0.2076
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2491
5
reference_url https://github.com/torvalds/linux/commit/0b760113a3a155269a3fba93a409c640031dd68f
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/0b760113a3a155269a3fba93a409c640031dd68f
6
reference_url http://www.openwall.com/lists/oss-security/2011/06/23/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/06/23/6
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=709393
reference_id 709393
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=709393
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-2491
reference_id CVE-2011-2491
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-2491
13
reference_url https://access.redhat.com/errata/RHSA-2011:1189
reference_id RHSA-2011:1189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1189
14
reference_url https://access.redhat.com/errata/RHSA-2011:1212
reference_id RHSA-2011:1212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1212
15
reference_url https://access.redhat.com/errata/RHSA-2011:1253
reference_id RHSA-2011:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1253
16
reference_url https://access.redhat.com/errata/RHSA-2011:1813
reference_id RHSA-2011:1813
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1813
17
reference_url https://usn.ubuntu.com/1244-1/
reference_id USN-1244-1
reference_type
scores
url https://usn.ubuntu.com/1244-1/
18
reference_url https://usn.ubuntu.com/1268-1/
reference_id USN-1268-1
reference_type
scores
url https://usn.ubuntu.com/1268-1/
19
reference_url https://usn.ubuntu.com/1269-1/
reference_id USN-1269-1
reference_type
scores
url https://usn.ubuntu.com/1269-1/
20
reference_url https://usn.ubuntu.com/1271-1/
reference_id USN-1271-1
reference_type
scores
url https://usn.ubuntu.com/1271-1/
21
reference_url https://usn.ubuntu.com/1272-1/
reference_id USN-1272-1
reference_type
scores
url https://usn.ubuntu.com/1272-1/
22
reference_url https://usn.ubuntu.com/1274-1/
reference_id USN-1274-1
reference_type
scores
url https://usn.ubuntu.com/1274-1/
23
reference_url https://usn.ubuntu.com/1278-1/
reference_id USN-1278-1
reference_type
scores
url https://usn.ubuntu.com/1278-1/
24
reference_url https://usn.ubuntu.com/1279-1/
reference_id USN-1279-1
reference_type
scores
url https://usn.ubuntu.com/1279-1/
25
reference_url https://usn.ubuntu.com/1281-1/
reference_id USN-1281-1
reference_type
scores
url https://usn.ubuntu.com/1281-1/
26
reference_url https://usn.ubuntu.com/1285-1/
reference_id USN-1285-1
reference_type
scores
url https://usn.ubuntu.com/1285-1/
27
reference_url https://usn.ubuntu.com/1286-1/
reference_id USN-1286-1
reference_type
scores
url https://usn.ubuntu.com/1286-1/
Weaknesses
0
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Exploits
Severity_range_score4.9 - 4.9
Exploitability0.5
Weighted_severity4.4
Risk_score2.2
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-s48v-g94e-jkb9