« List of all packages

core_unix

Opam page: https://opam.ocaml.org/packages/core_unix/

Versions

Version
core_unix.v0.17.1 (latest)
core_unix.v0.17.0
core_unix.v0.16.0
core_unix.v0.15.2
core_unix.v0.15.1
core_unix.v0.15.0
core_unix.v0.14.0

Vulnerable external dependencies (69126)

Product For package Vendor Severity CVE Published
linux-headers core_unix.v0.17.0 n/a High CVE-2023-51042 1/23/2024
linux-headers core_unix.v0.17.1 n/a High CVE-2023-51042 1/23/2024
linux-headers core_unix.v0.17.0 Red Hat Medium CVE-2023-5090 - Kernel: kvm: svm: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs 11/6/2023
linux-headers core_unix.v0.14.0 Red Hat Medium CVE-2023-5090 - Kernel: kvm: svm: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs 11/6/2023
linux-headers core_unix.v0.15.0 Red Hat Medium CVE-2023-5090 - Kernel: kvm: svm: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs 11/6/2023
linux-headers core_unix.v0.17.1 Red Hat Medium CVE-2023-5090 - Kernel: kvm: svm: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs 11/6/2023
linux-headers core_unix.v0.15.1 Red Hat Medium CVE-2023-5090 - Kernel: kvm: svm: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs 11/6/2023
linux-headers core_unix.v0.15.2 Red Hat Medium CVE-2023-5090 - Kernel: kvm: svm: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs 11/6/2023
linux-headers core_unix.v0.17.1 n/a Unknown CVE-2023-50431 12/9/2023
linux-headers core_unix.v0.17.0 n/a Unknown CVE-2023-50431 12/9/2023
linux-headers core_unix.v0.15.1 n/a Unknown CVE-2023-50431 12/9/2023
linux-headers core_unix.v0.15.2 n/a Unknown CVE-2023-50431 12/9/2023
linux-headers core_unix.v0.15.0 n/a Unknown CVE-2023-50431 12/9/2023
linux-headers core_unix.v0.14.0 n/a Unknown CVE-2023-50431 12/9/2023
linux-headers core_unix.v0.15.0 Linux High CVE-2023-4921 - Use-after-free in Linux kernel's net/sched: sch_qfq component 9/12/2023
linux-headers core_unix.v0.17.0 Linux High CVE-2023-4921 - Use-after-free in Linux kernel's net/sched: sch_qfq component 9/12/2023
linux-headers core_unix.v0.17.1 Linux High CVE-2023-4921 - Use-after-free in Linux kernel's net/sched: sch_qfq component 9/12/2023
linux-headers core_unix.v0.15.2 Linux High CVE-2023-4921 - Use-after-free in Linux kernel's net/sched: sch_qfq component 9/12/2023
linux-headers core_unix.v0.15.1 Linux High CVE-2023-4921 - Use-after-free in Linux kernel's net/sched: sch_qfq component 9/12/2023
linux-headers core_unix.v0.14.0 Linux High CVE-2023-4921 - Use-after-free in Linux kernel's net/sched: sch_qfq component 9/12/2023