« List of all packages

conf-linux-libc-dev

Opam page: https://opam.ocaml.org/packages/conf-linux-libc-dev/

Versions

Version
conf-linux-libc-dev.0 (latest)

Vulnerable external dependencies (48469)

Product For package Vendor Severity CVE Published
kernel-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22991 - libceph: make free_choose_arg_map() resilient to partial allocation 1/23/2026
linux-libc-dev conf-linux-libc-dev.0 Linux Unknown CVE-2026-22991 - libceph: make free_choose_arg_map() resilient to partial allocation 1/23/2026
linux-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22991 - libceph: make free_choose_arg_map() resilient to partial allocation 1/23/2026
linux-api-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22991 - libceph: make free_choose_arg_map() resilient to partial allocation 1/23/2026
kernel-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22990 - libceph: replace overzealous BUG_ON in osdmap_apply_incremental() 1/23/2026
linux-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22990 - libceph: replace overzealous BUG_ON in osdmap_apply_incremental() 1/23/2026
linux-libc-dev conf-linux-libc-dev.0 Linux Unknown CVE-2026-22990 - libceph: replace overzealous BUG_ON in osdmap_apply_incremental() 1/23/2026
linux-api-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22990 - libceph: replace overzealous BUG_ON in osdmap_apply_incremental() 1/23/2026
linux-api-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22989 - nfsd: check that server is running in unlock_filesystem 1/23/2026
linux-libc-dev conf-linux-libc-dev.0 Linux Unknown CVE-2026-22989 - nfsd: check that server is running in unlock_filesystem 1/23/2026
linux-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22989 - nfsd: check that server is running in unlock_filesystem 1/23/2026
kernel-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22989 - nfsd: check that server is running in unlock_filesystem 1/23/2026
linux-api-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22988 - arp: do not assume dev_hard_header() does not change skb->head 1/23/2026
linux-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22988 - arp: do not assume dev_hard_header() does not change skb->head 1/23/2026
linux-libc-dev conf-linux-libc-dev.0 Linux Unknown CVE-2026-22988 - arp: do not assume dev_hard_header() does not change skb->head 1/23/2026
kernel-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22988 - arp: do not assume dev_hard_header() does not change skb->head 1/23/2026
kernel-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22987 - net/sched: act_api: avoid dereferencing ERR_PTR in tcf_idrinfo_destroy 1/23/2026
linux-libc-dev conf-linux-libc-dev.0 Linux Unknown CVE-2026-22987 - net/sched: act_api: avoid dereferencing ERR_PTR in tcf_idrinfo_destroy 1/23/2026
linux-api-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22987 - net/sched: act_api: avoid dereferencing ERR_PTR in tcf_idrinfo_destroy 1/23/2026
linux-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-22987 - net/sched: act_api: avoid dereferencing ERR_PTR in tcf_idrinfo_destroy 1/23/2026