« List of all packages

conf-linux-libc-dev

Opam page: https://opam.ocaml.org/packages/conf-linux-libc-dev/

Versions

Version
conf-linux-libc-dev.0 (latest)

Vulnerable external dependencies (45126)

Product For package Vendor Severity CVE Published
linux-headers conf-linux-libc-dev.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers conf-linux-libc-dev.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-libc-dev conf-linux-libc-dev.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
kernel-headers conf-linux-libc-dev.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-api-headers conf-linux-libc-dev.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-api-headers conf-linux-libc-dev.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
kernel-headers conf-linux-libc-dev.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers conf-linux-libc-dev.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-libc-dev conf-linux-libc-dev.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers conf-linux-libc-dev.0 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-api-headers conf-linux-libc-dev.0 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
kernel-headers conf-linux-libc-dev.0 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-api-headers conf-linux-libc-dev.0 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
kernel-headers conf-linux-libc-dev.0 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-libc-dev conf-linux-libc-dev.0 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers conf-linux-libc-dev.0 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-libc-dev conf-linux-libc-dev.0 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-libc-dev conf-linux-libc-dev.0 Red Hat Medium CVE-2023-4133 - Kernel: cxgb4: use-after-free in ch_flower_stats_cb() 8/3/2023
linux-api-headers conf-linux-libc-dev.0 Red Hat Medium CVE-2023-4133 - Kernel: cxgb4: use-after-free in ch_flower_stats_cb() 8/3/2023
linux-headers conf-linux-libc-dev.0 Red Hat Medium CVE-2023-4133 - Kernel: cxgb4: use-after-free in ch_flower_stats_cb() 8/3/2023