« List of all packages

conf-libbpf

Opam page: https://opam.ocaml.org/packages/conf-libbpf/

Versions

Version
conf-libbpf.0.1.0 (latest)

Vulnerable external dependencies (10729)

Product For package Vendor Severity CVE Published
libbpf-dev conf-libbpf.0.1.0 Linux High CVE-2025-21652 - ipvlan: Fix use-after-free in ipvlan_get_iflink(). 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Unknown CVE-2025-21651 - net: hns3: don't auto enable misc vector 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux High CVE-2025-21650 - net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Medium CVE-2025-21649 - net: hns3: fix kernel crash when 1588 is sent on HIP08 devices 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Unknown CVE-2025-21648 - netfilter: conntrack: clamp maximum hashtable size to INT_MAX 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Unknown CVE-2025-21647 - sched: sch_cake: add bounds checks to host bulk flow fairness counts 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Unknown CVE-2025-21646 - afs: Fix the maximum cell name length 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Unknown CVE-2025-21645 - platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Medium CVE-2025-21644 - drm/xe: Fix tlb invalidation when wedging 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Unknown CVE-2025-21643 - netfs: Fix kernel async DIO 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Medium CVE-2025-21642 - mptcp: sysctl: sched: avoid using current->nsproxy 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Medium CVE-2025-21641 - mptcp: sysctl: blackhole timeout: avoid using current->nsproxy 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Unknown CVE-2025-21640 - sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Medium CVE-2025-21639 - sctp: sysctl: rto_min/max: avoid using current->nsproxy 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Unknown CVE-2025-21638 - sctp: sysctl: auth_enable: avoid using current->nsproxy 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Medium CVE-2025-21637 - sctp: sysctl: udp_port: avoid using current->nsproxy 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Medium CVE-2025-21636 - sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Medium CVE-2025-21635 - rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Medium CVE-2025-21634 - cgroup/cpuset: remove kernfs active break 1/19/2025
libbpf-dev conf-libbpf.0.1.0 Linux Unknown CVE-2025-21632 - x86/fpu: Ensure shadow stack is active before "getting" registers 1/19/2025