Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-88gf-yp5g-kyg4
Summarykernel: ALSA: caiaq - Fix possible string-buffer overflow
Aliases
0
alias CVE-2011-0712
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.32-71.29.1?arch=el6
purl pkg:rpm/redhat/kernel@2.6.32-71.29.1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1rgx-tmw4-uqgt
1
vulnerability VCID-6b25-pj7t-6ygv
2
vulnerability VCID-75ba-49cu-zuaj
3
vulnerability VCID-88gf-yp5g-kyg4
4
vulnerability VCID-b5ab-aade-4kfw
5
vulnerability VCID-gyye-vwnb-6qeg
6
vulnerability VCID-k9ct-x12b-cfd6
7
vulnerability VCID-paxh-r3cd-cfdu
8
vulnerability VCID-qraj-ye4g-8qdr
9
vulnerability VCID-rh8x-5dz8-tbd6
10
vulnerability VCID-sm7b-9u6f-8bar
11
vulnerability VCID-ydtx-ae9c-eqah
12
vulnerability VCID-yevh-cfer-dud1
13
vulnerability VCID-zedv-xfpx-effg
14
vulnerability VCID-zumd-vknc-87ba
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-71.29.1%3Farch=el6
References
0
reference_url http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=eaae55dac6b64c0616046436b294e69fc5311581
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=eaae55dac6b64c0616046436b294e69fc5311581
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0712.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0712.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0712
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17438
published_at 2026-04-26T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17556
published_at 2026-04-01T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17719
published_at 2026-04-02T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17766
published_at 2026-04-04T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17493
published_at 2026-04-07T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17582
published_at 2026-04-08T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17643
published_at 2026-04-09T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17662
published_at 2026-04-11T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17615
published_at 2026-04-12T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17562
published_at 2026-04-13T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17507
published_at 2026-04-16T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17516
published_at 2026-04-18T12:55:00Z
12
value 0.00056
scoring_system epss
scoring_elements 0.1755
published_at 2026-04-21T12:55:00Z
13
value 0.00056
scoring_system epss
scoring_elements 0.1746
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0712
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65461
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65461
4
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110215.bz2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.38-rc4-next-20110215.bz2
5
reference_url http://www.openwall.com/lists/oss-security/2011/02/16/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/02/16/11
6
reference_url http://www.openwall.com/lists/oss-security/2011/02/16/12
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/02/16/12
7
reference_url http://www.openwall.com/lists/oss-security/2011/02/16/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/02/16/5
8
reference_url http://www.securityfocus.com/bid/46419
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46419
9
reference_url http://www.ubuntu.com/usn/USN-1146-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1146-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=677881
reference_id 677881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=677881
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0712
reference_id CVE-2011-0712
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0712
18
reference_url https://access.redhat.com/errata/RHSA-2011:0498
reference_id RHSA-2011:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0498
19
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
20
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
21
reference_url https://usn.ubuntu.com/1146-1/
reference_id USN-1146-1
reference_type
scores
url https://usn.ubuntu.com/1146-1/
22
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
23
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
24
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
25
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
Weaknesses
0
cwe_id 120
name Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
description The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Exploits
Severity_range_score7.2 - 7.2
Exploitability0.5
Weighted_severity6.5
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-88gf-yp5g-kyg4