« List of all packages

uring

Opam page: https://opam.ocaml.org/packages/uring/

Versions

Version
uring.2.7.0 (latest)
uring.0.9
uring.0.8
uring.0.7
uring.0.6
uring.0.5
uring.0.4
uring.0.3
uring.0.2
uring.0.1

Vulnerable external dependencies (127410)

Product For package Vendor Severity CVE Published
linux-headers uring.0.8 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers uring.0.4 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers uring.0.5 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers uring.0.6 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers uring.0.9 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers uring.0.1 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers uring.2.7.0 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers uring.0.3 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers uring.0.7 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers uring.0.2 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers uring.0.6 Linux High CVE-2026-23226 - ksmbd: add chann_lock to protect ksmbd_chann_list xarray 2/18/2026
linux-headers uring.0.8 Linux High CVE-2026-23226 - ksmbd: add chann_lock to protect ksmbd_chann_list xarray 2/18/2026
linux-headers uring.2.7.0 Linux High CVE-2026-23226 - ksmbd: add chann_lock to protect ksmbd_chann_list xarray 2/18/2026
linux-headers uring.0.5 Linux High CVE-2026-23226 - ksmbd: add chann_lock to protect ksmbd_chann_list xarray 2/18/2026
linux-headers uring.0.9 Linux High CVE-2026-23226 - ksmbd: add chann_lock to protect ksmbd_chann_list xarray 2/18/2026
linux-headers uring.0.3 Linux High CVE-2026-23226 - ksmbd: add chann_lock to protect ksmbd_chann_list xarray 2/18/2026
linux-headers uring.0.1 Linux High CVE-2026-23226 - ksmbd: add chann_lock to protect ksmbd_chann_list xarray 2/18/2026
linux-headers uring.0.4 Linux High CVE-2026-23226 - ksmbd: add chann_lock to protect ksmbd_chann_list xarray 2/18/2026
linux-headers uring.0.7 Linux High CVE-2026-23226 - ksmbd: add chann_lock to protect ksmbd_chann_list xarray 2/18/2026
linux-headers uring.0.2 Linux High CVE-2026-23226 - ksmbd: add chann_lock to protect ksmbd_chann_list xarray 2/18/2026