« List of all packages

conf-libbpf

Opam page: https://opam.ocaml.org/packages/conf-libbpf/

Versions

Version
conf-libbpf.0.1.0 (latest)

Vulnerable external dependencies (11177)

Product For package Vendor Severity CVE Published
libbpf-dev conf-libbpf.0.1.0 Red Hat High CVE-2023-6606 - Kernel: out-of-bounds read vulnerability in smbcalcsize 12/8/2023
libbpf-dev conf-libbpf.0.1.0 Red Hat Medium CVE-2023-6560 - Kernel: io_uring out of boundary memory access in __io_uaddr_map() 12/8/2023
libbpf-dev conf-libbpf.0.1.0 Fedora Medium CVE-2023-6560 - Kernel: io_uring out of boundary memory access in __io_uaddr_map() 12/8/2023
libbpf-dev conf-libbpf.0.1.0 n/a Medium CVE-2023-6560 - Kernel: io_uring out of boundary memory access in __io_uaddr_map() 12/8/2023
libbpf-dev conf-libbpf.0.1.0 Red Hat High CVE-2023-6546 - Kernel: gsm multiplexing race condition leads to privilege escalation 12/21/2023
libbpf-dev conf-libbpf.0.1.0 Red Hat Medium CVE-2023-6536 - Kernel: null pointer dereference in __nvmet_req_complete 2/7/2024
libbpf-dev conf-libbpf.0.1.0 Red Hat High CVE-2023-6531 - Kernel: gc's deletion of an skb races with unix_stream_read_generic() leading to uaf 1/21/2024
libbpf-dev conf-libbpf.0.1.0 Red Hat Medium CVE-2023-6356 - Kernel: null pointer dereference in nvmet_tcp_build_iovec 2/7/2024
libbpf-dev conf-libbpf.0.1.0 Red Hat High CVE-2023-6270 - Kernel: aoe: improper reference count leads to use-after-free vulnerability 1/4/2024
libbpf-dev conf-libbpf.0.1.0 Red Hat High CVE-2023-6200 - Kernel: icmpv6 router advertisement packets, aka linux tcp/ip remote code execution vulnerability 1/28/2024
libbpf-dev conf-libbpf.0.1.0 n/a High CVE-2023-6200 - Kernel: icmpv6 router advertisement packets, aka linux tcp/ip remote code execution vulnerability 1/28/2024
libbpf-dev conf-libbpf.0.1.0 Fedora High CVE-2023-6200 - Kernel: icmpv6 router advertisement packets, aka linux tcp/ip remote code execution vulnerability 1/28/2024
libbpf-dev conf-libbpf.0.1.0 Linux High CVE-2023-6111 - Use-after-free in Linux kernel's netfilter: nf_tables component 11/14/2023
libbpf-dev conf-libbpf.0.1.0 The Linux Kernel Organization High CVE-2023-6040 - An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family) 1/12/2024
libbpf-dev conf-libbpf.0.1.0 Fedora Medium CVE-2023-6039 - Kernel: use-after-free in drivers/net/usb/lan78xx.c in lan78xx_disconnect 11/9/2023
libbpf-dev conf-libbpf.0.1.0 Red Hat Medium CVE-2023-6039 - Kernel: use-after-free in drivers/net/usb/lan78xx.c in lan78xx_disconnect 11/9/2023
libbpf-dev conf-libbpf.0.1.0 n/a Medium CVE-2023-6039 - Kernel: use-after-free in drivers/net/usb/lan78xx.c in lan78xx_disconnect 11/9/2023
libbpf-dev conf-libbpf.0.1.0 Fedora High CVE-2023-5972 - Kernel: the nfta_inner_num and nfta_expr_name netlink attributes accessed without checking its presence in nft_inner.c 11/23/2023
libbpf-dev conf-libbpf.0.1.0 Red Hat High CVE-2023-5972 - Kernel: the nfta_inner_num and nfta_expr_name netlink attributes accessed without checking its presence in nft_inner.c 11/23/2023
libbpf-dev conf-libbpf.0.1.0 n/a High CVE-2023-5972 - Kernel: the nfta_inner_num and nfta_expr_name netlink attributes accessed without checking its presence in nft_inner.c 11/23/2023