« List of all packages

core

Opam page: https://opam.ocaml.org/packages/core/

Versions

Version
core.v0.17.1 (latest)
core.v0.17.0
core.v0.16.2
core.v0.16.1
core.v0.16.0
core.v0.15.1
core.v0.15.0
core.v0.14.1
core.v0.14.0
core.v0.13.0
core.v0.12.4
core.v0.12.3
core.v0.12.2

Vulnerable external dependencies (69126)

Product For package Vendor Severity CVE Published
linux-headers core.v0.13.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers core.v0.14.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers core.v0.12.2 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers core.v0.12.3 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers core.v0.12.3 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers core.v0.14.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers core.v0.13.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers core.v0.12.2 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers core.v0.14.1 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers core.v0.12.4 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers core.v0.13.0 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers core.v0.14.0 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers core.v0.14.1 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers core.v0.14.0 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers core.v0.13.0 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers core.v0.12.2 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers core.v0.12.3 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers core.v0.12.4 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers core.v0.12.3 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers core.v0.14.1 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024