« List of all packages

conf-linux-libc-dev

Opam page: https://opam.ocaml.org/packages/conf-linux-libc-dev/

Versions

Version
conf-linux-libc-dev.0 (latest)

Vulnerable external dependencies (50946)

Product For package Vendor Severity CVE Published
linux-libc-dev conf-linux-libc-dev.0 Linux High CVE-2026-23231 - netfilter: nf_tables: fix use-after-free in nf_tables_addchain() 3/4/2026
linux-headers conf-linux-libc-dev.0 Linux High CVE-2026-23231 - netfilter: nf_tables: fix use-after-free in nf_tables_addchain() 3/4/2026
kernel-headers conf-linux-libc-dev.0 Linux High CVE-2026-23231 - netfilter: nf_tables: fix use-after-free in nf_tables_addchain() 3/4/2026
linux-api-headers conf-linux-libc-dev.0 Linux High CVE-2026-23231 - netfilter: nf_tables: fix use-after-free in nf_tables_addchain() 3/4/2026
kernel-headers conf-linux-libc-dev.0 Linux High CVE-2026-23230 - smb: client: split cached_fid bitfields to avoid shared-byte RMW races 2/18/2026
linux-headers conf-linux-libc-dev.0 Linux High CVE-2026-23230 - smb: client: split cached_fid bitfields to avoid shared-byte RMW races 2/18/2026
linux-libc-dev conf-linux-libc-dev.0 Linux High CVE-2026-23230 - smb: client: split cached_fid bitfields to avoid shared-byte RMW races 2/18/2026
linux-api-headers conf-linux-libc-dev.0 Linux High CVE-2026-23230 - smb: client: split cached_fid bitfields to avoid shared-byte RMW races 2/18/2026
linux-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-23229 - crypto: virtio - Add spinlock protection with virtqueue notification 2/18/2026
linux-libc-dev conf-linux-libc-dev.0 Linux Unknown CVE-2026-23229 - crypto: virtio - Add spinlock protection with virtqueue notification 2/18/2026
kernel-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-23229 - crypto: virtio - Add spinlock protection with virtqueue notification 2/18/2026
linux-api-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-23229 - crypto: virtio - Add spinlock protection with virtqueue notification 2/18/2026
linux-libc-dev conf-linux-libc-dev.0 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
linux-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
linux-api-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
kernel-headers conf-linux-libc-dev.0 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
linux-api-headers conf-linux-libc-dev.0 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers conf-linux-libc-dev.0 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
kernel-headers conf-linux-libc-dev.0 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-libc-dev conf-linux-libc-dev.0 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026