« List of all packages

core

Opam page: https://opam.ocaml.org/packages/core/

Versions

Version
core.v0.17.1 (latest)
core.v0.17.0
core.v0.16.2
core.v0.16.1
core.v0.16.0
core.v0.15.1
core.v0.15.0
core.v0.14.1
core.v0.14.0
core.v0.13.0
core.v0.12.4
core.v0.12.3
core.v0.12.2

Vulnerable external dependencies (20)

Product For package Vendor Severity CVE Published
linux-headers core.v0.12.3 Linux Unknown CVE-2024-50129 - net: pse-pd: Fix out of bound for loop 11/5/2024
linux-headers core.v0.12.4 Linux Unknown CVE-2024-50129 - net: pse-pd: Fix out of bound for loop 11/5/2024
linux-headers core.v0.12.4 Linux Unknown CVE-2024-50128 - net: wwan: fix global oob in wwan_rtnl_policy 11/5/2024
linux-headers core.v0.12.2 Linux Unknown CVE-2024-50128 - net: wwan: fix global oob in wwan_rtnl_policy 11/5/2024
linux-headers core.v0.14.0 Linux Unknown CVE-2024-50128 - net: wwan: fix global oob in wwan_rtnl_policy 11/5/2024
linux-headers core.v0.14.1 Linux Unknown CVE-2024-50128 - net: wwan: fix global oob in wwan_rtnl_policy 11/5/2024
linux-headers core.v0.12.3 Linux Unknown CVE-2024-50128 - net: wwan: fix global oob in wwan_rtnl_policy 11/5/2024
linux-headers core.v0.13.0 Linux Unknown CVE-2024-50128 - net: wwan: fix global oob in wwan_rtnl_policy 11/5/2024
linux-headers core.v0.12.2 Linux High CVE-2024-50127 - net: sched: fix use-after-free in taprio_change() 11/5/2024
linux-headers core.v0.12.3 Linux High CVE-2024-50127 - net: sched: fix use-after-free in taprio_change() 11/5/2024
linux-headers core.v0.14.0 Linux High CVE-2024-50127 - net: sched: fix use-after-free in taprio_change() 11/5/2024
linux-headers core.v0.13.0 Linux High CVE-2024-50127 - net: sched: fix use-after-free in taprio_change() 11/5/2024
linux-headers core.v0.14.1 Linux High CVE-2024-50127 - net: sched: fix use-after-free in taprio_change() 11/5/2024
linux-headers core.v0.12.4 Linux High CVE-2024-50127 - net: sched: fix use-after-free in taprio_change() 11/5/2024
linux-headers core.v0.12.4 Linux High CVE-2024-50126 - net: sched: use RCU read-side critical section in taprio_dump() 11/5/2024
linux-headers core.v0.12.3 Linux High CVE-2024-50126 - net: sched: use RCU read-side critical section in taprio_dump() 11/5/2024
linux-headers core.v0.14.0 Linux High CVE-2024-50126 - net: sched: use RCU read-side critical section in taprio_dump() 11/5/2024
linux-headers core.v0.14.1 Linux High CVE-2024-50126 - net: sched: use RCU read-side critical section in taprio_dump() 11/5/2024
linux-headers core.v0.12.2 Linux High CVE-2024-50126 - net: sched: use RCU read-side critical section in taprio_dump() 11/5/2024
linux-headers core.v0.13.0 Linux High CVE-2024-50126 - net: sched: use RCU read-side critical section in taprio_dump() 11/5/2024