« List of all packages

rawlink-lwt

Opam page: https://opam.ocaml.org/packages/rawlink-lwt/

Versions

Version
rawlink-lwt.2.1 (latest)

Vulnerable external dependencies (10719)

Product For package Vendor Severity CVE Published
linux-headers rawlink-lwt.2.1 Linux Unknown CVE-2025-21776 - USB: hub: Ignore non-compliant devices with too many configs or interfaces 2/27/2025
linux-headers rawlink-lwt.2.1 Linux Medium CVE-2025-21775 - can: ctucanfd: handle skb allocation failure 2/27/2025
linux-headers rawlink-lwt.2.1 Linux Medium CVE-2025-21774 - can: rockchip: rkcanfd_handle_rx_fifo_overflow_int(): bail out if skb cannot be allocated 2/27/2025
linux-headers rawlink-lwt.2.1 Linux Medium CVE-2025-21773 - can: etas_es58x: fix potential NULL pointer dereference on udev->serial 2/27/2025
linux-headers rawlink-lwt.2.1 Linux Unknown CVE-2025-21772 - partitions: mac: fix handling of bogus partition table 2/27/2025
linux-headers rawlink-lwt.2.1 Linux Unknown CVE-2025-21771 - sched_ext: Fix incorrect autogroup migration detection 2/27/2025
linux-headers rawlink-lwt.2.1 Linux Medium CVE-2025-21770 - iommu: Fix potential memory leak in iopf_queue_remove_device() 2/27/2025
linux-headers rawlink-lwt.2.1 Linux Medium CVE-2025-21769 - ptp: vmclock: Add .owner to vmclock_miscdev_fops 2/27/2025
linux-headers rawlink-lwt.2.1 Linux Unknown CVE-2025-21768 - net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels 2/27/2025
linux-headers rawlink-lwt.2.1 Linux Unknown CVE-2025-21767 - clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context 2/27/2025
linux-headers rawlink-lwt.2.1 Linux Unknown CVE-2025-21766 - ipv4: use RCU protection in __ip_rt_update_pmtu() 2/27/2025
linux-headers rawlink-lwt.2.1 Linux Unknown CVE-2025-21765 - ipv6: use RCU protection in ip6_default_advmss() 2/27/2025
linux-headers rawlink-lwt.2.1 Linux High CVE-2025-21764 - ndisc: use RCU protection in ndisc_alloc_skb() 2/27/2025
linux-headers rawlink-lwt.2.1 Linux High CVE-2025-21763 - neighbour: use RCU protection in __neigh_notify() 2/27/2025
linux-headers rawlink-lwt.2.1 Linux High CVE-2025-21762 - arp: use RCU protection in arp_xmit() 2/27/2025
linux-headers rawlink-lwt.2.1 Linux High CVE-2025-21761 - openvswitch: use RCU protection in ovs_vport_cmd_fill_info() 2/27/2025
linux-headers rawlink-lwt.2.1 Linux High CVE-2025-21760 - ndisc: extend RCU protection in ndisc_send_skb() 2/27/2025
linux-headers rawlink-lwt.2.1 Linux High CVE-2025-21759 - ipv6: mcast: extend RCU protection in igmp6_send() 2/27/2025
linux-headers rawlink-lwt.2.1 Linux Unknown CVE-2025-21758 - ipv6: mcast: add RCU protection to mld_newpack() 2/27/2025
linux-headers rawlink-lwt.2.1 Linux High CVE-2025-21756 - vsock: Keep the binding until socket destruction 2/27/2025