Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-ku5j-hkct-aug2
Summarykernel: panic in ib_cm:cm_work_handler
Aliases
0
alias CVE-2011-0695
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.18-238.19.1?arch=el5
purl pkg:rpm/redhat/kernel@2.6.18-238.19.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1rgx-tmw4-uqgt
1
vulnerability VCID-4gcp-bfru-57ay
2
vulnerability VCID-8nyx-mdyc-t3ez
3
vulnerability VCID-a9mu-gdgc-cbct
4
vulnerability VCID-au4y-xz41-zyfy
5
vulnerability VCID-dd7k-u8ev-abhz
6
vulnerability VCID-dx7m-ma2j-6ket
7
vulnerability VCID-fhyj-cymx-pfgp
8
vulnerability VCID-j67y-7adf-3ygp
9
vulnerability VCID-ku5j-hkct-aug2
10
vulnerability VCID-nktq-p6vq-hkgq
11
vulnerability VCID-wg43-zbfb-nfaq
12
vulnerability VCID-ydtx-ae9c-eqah
13
vulnerability VCID-yevh-cfer-dud1
14
vulnerability VCID-zumd-vknc-87ba
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-238.19.1%3Farch=el5
1
url pkg:rpm/redhat/kernel@2.6.32-71.24.1?arch=el6
purl pkg:rpm/redhat/kernel@2.6.32-71.24.1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1n7j-hq91-qqgy
1
vulnerability VCID-2v2h-1vgg-qubq
2
vulnerability VCID-4trp-muyy-ufez
3
vulnerability VCID-8zmc-qqfc-m7e1
4
vulnerability VCID-ccy6-xxzm-vbb4
5
vulnerability VCID-dg9k-nfvc-k7en
6
vulnerability VCID-gwyq-wkdy-5fba
7
vulnerability VCID-h9a4-7v2b-9kg2
8
vulnerability VCID-ku5j-hkct-aug2
9
vulnerability VCID-uxye-sz24-dqd4
10
vulnerability VCID-xr4s-smmp-fubc
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-71.24.1%3Farch=el6
2
url pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.64?arch=el5rt
purl pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.64?arch=el5rt
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4qtb-f8h1-6ybn
1
vulnerability VCID-75ba-49cu-zuaj
2
vulnerability VCID-b5ab-aade-4kfw
3
vulnerability VCID-gyye-vwnb-6qeg
4
vulnerability VCID-ku5j-hkct-aug2
5
vulnerability VCID-p45k-2b85-9ydy
6
vulnerability VCID-paxh-r3cd-cfdu
7
vulnerability VCID-phc7-fgab-sua4
8
vulnerability VCID-qtdb-h1kj-yybt
9
vulnerability VCID-rg3q-bcnw-1fdy
10
vulnerability VCID-rh8x-5dz8-tbd6
11
vulnerability VCID-wye8-98he-4bcv
12
vulnerability VCID-yevh-cfer-dud1
13
vulnerability VCID-ytng-8j5w-17ea
14
vulnerability VCID-zedv-xfpx-effg
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.64%3Farch=el5rt
References
0
reference_url http://rhn.redhat.com/errata/RHSA-2011-0927.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2011-0927.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0695.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0695.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0695
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63337
published_at 2026-04-26T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63193
published_at 2026-04-01T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63253
published_at 2026-04-02T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63282
published_at 2026-04-04T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63247
published_at 2026-04-07T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63298
published_at 2026-04-08T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63316
published_at 2026-04-09T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63333
published_at 2026-04-11T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63317
published_at 2026-04-16T12:55:00Z
9
value 0.00442
scoring_system epss
scoring_elements 0.63281
published_at 2026-04-13T12:55:00Z
10
value 0.00442
scoring_system epss
scoring_elements 0.63325
published_at 2026-04-18T12:55:00Z
11
value 0.00442
scoring_system epss
scoring_elements 0.63305
published_at 2026-04-21T12:55:00Z
12
value 0.00442
scoring_system epss
scoring_elements 0.63324
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0695
3
reference_url http://secunia.com/advisories/43693
reference_id
reference_type
scores
url http://secunia.com/advisories/43693
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66056
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66056
5
reference_url http://www.openwall.com/lists/oss-security/2011/03/11/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/03/11/1
6
reference_url http://www.securityfocus.com/bid/46839
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46839
7
reference_url http://www.spinics.net/lists/linux-rdma/msg07447.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/linux-rdma/msg07447.html
8
reference_url http://www.spinics.net/lists/linux-rdma/msg07448.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/linux-rdma/msg07448.html
9
reference_url http://www.ubuntu.com/usn/USN-1146-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1146-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=653648
reference_id 653648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=653648
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0695
reference_id CVE-2011-0695
reference_type
scores
0
value 5.7
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0695
19
reference_url https://access.redhat.com/errata/RHSA-2011:0421
reference_id RHSA-2011:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0421
20
reference_url https://access.redhat.com/errata/RHSA-2011:0500
reference_id RHSA-2011:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0500
21
reference_url https://access.redhat.com/errata/RHSA-2011:0927
reference_id RHSA-2011:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0927
22
reference_url https://usn.ubuntu.com/1111-1/
reference_id USN-1111-1
reference_type
scores
url https://usn.ubuntu.com/1111-1/
23
reference_url https://usn.ubuntu.com/1141-1/
reference_id USN-1141-1
reference_type
scores
url https://usn.ubuntu.com/1141-1/
24
reference_url https://usn.ubuntu.com/1146-1/
reference_id USN-1146-1
reference_type
scores
url https://usn.ubuntu.com/1146-1/
25
reference_url https://usn.ubuntu.com/1159-1/
reference_id USN-1159-1
reference_type
scores
url https://usn.ubuntu.com/1159-1/
26
reference_url https://usn.ubuntu.com/1160-1/
reference_id USN-1160-1
reference_type
scores
url https://usn.ubuntu.com/1160-1/
27
reference_url https://usn.ubuntu.com/1162-1/
reference_id USN-1162-1
reference_type
scores
url https://usn.ubuntu.com/1162-1/
28
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
29
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
30
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
Weaknesses
0
cwe_id 362
name Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
description The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Exploits
Severity_range_score5.7 - 5.7
Exploitability0.5
Weighted_severity5.1
Risk_score2.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-ku5j-hkct-aug2