« List of all packages

core_unix

Opam page: https://opam.ocaml.org/packages/core_unix/

Versions

Version
core_unix.v0.17.1 (latest)
core_unix.v0.17.0
core_unix.v0.16.0
core_unix.v0.15.2
core_unix.v0.15.1
core_unix.v0.15.0
core_unix.v0.14.0

Vulnerable external dependencies (76440)

Product For package Vendor Severity CVE Published
linux-headers core_unix.v0.14.0 Linux Unknown CVE-2026-23107 - arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA 2/4/2026
linux-headers core_unix.v0.15.2 Linux Unknown CVE-2026-23107 - arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA 2/4/2026
linux-headers core_unix.v0.15.1 Linux Unknown CVE-2026-23107 - arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA 2/4/2026
linux-headers core_unix.v0.17.1 Linux Unknown CVE-2026-23107 - arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA 2/4/2026
linux-headers core_unix.v0.15.2 Linux Unknown CVE-2026-23106 - timekeeping: Adjust the leap state for the correct auxiliary timekeeper 2/4/2026
linux-headers core_unix.v0.14.0 Linux Unknown CVE-2026-23106 - timekeeping: Adjust the leap state for the correct auxiliary timekeeper 2/4/2026
linux-headers core_unix.v0.17.1 Linux Unknown CVE-2026-23106 - timekeeping: Adjust the leap state for the correct auxiliary timekeeper 2/4/2026
linux-headers core_unix.v0.15.1 Linux Unknown CVE-2026-23106 - timekeeping: Adjust the leap state for the correct auxiliary timekeeper 2/4/2026
linux-headers core_unix.v0.17.0 Linux Unknown CVE-2026-23106 - timekeeping: Adjust the leap state for the correct auxiliary timekeeper 2/4/2026
linux-headers core_unix.v0.15.0 Linux Unknown CVE-2026-23106 - timekeeping: Adjust the leap state for the correct auxiliary timekeeper 2/4/2026
linux-headers core_unix.v0.17.0 Linux High CVE-2026-23105 - net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag 2/4/2026
linux-headers core_unix.v0.15.1 Linux High CVE-2026-23105 - net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag 2/4/2026
linux-headers core_unix.v0.15.2 Linux High CVE-2026-23105 - net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag 2/4/2026
linux-headers core_unix.v0.14.0 Linux High CVE-2026-23105 - net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag 2/4/2026
linux-headers core_unix.v0.17.1 Linux High CVE-2026-23105 - net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag 2/4/2026
linux-headers core_unix.v0.15.0 Linux High CVE-2026-23105 - net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag 2/4/2026
linux-headers core_unix.v0.17.0 Linux Unknown CVE-2026-23104 - ice: fix devlink reload call trace 2/4/2026
linux-headers core_unix.v0.17.1 Linux Unknown CVE-2026-23104 - ice: fix devlink reload call trace 2/4/2026
linux-headers core_unix.v0.14.0 Linux Unknown CVE-2026-23104 - ice: fix devlink reload call trace 2/4/2026
linux-headers core_unix.v0.15.0 Linux Unknown CVE-2026-23104 - ice: fix devlink reload call trace 2/4/2026