« List of all packages

core_unix

Opam page: https://opam.ocaml.org/packages/core_unix/

Versions

Version
core_unix.v0.17.1 (latest)
core_unix.v0.17.0
core_unix.v0.16.0
core_unix.v0.15.2
core_unix.v0.15.1
core_unix.v0.15.0
core_unix.v0.14.0

Vulnerable external dependencies (69126)

Product For package Vendor Severity CVE Published
linux-headers core_unix.v0.15.0 Red Hat Low CVE-2023-39194 - Kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() 10/9/2023
linux-headers core_unix.v0.15.2 Red Hat Low CVE-2023-39194 - Kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() 10/9/2023
linux-headers core_unix.v0.15.2 Red Hat Medium CVE-2023-39193 - Kernel: netfilter: xtables sctp out-of-bounds read in match_flags() 10/9/2023
linux-headers core_unix.v0.15.0 Red Hat Medium CVE-2023-39193 - Kernel: netfilter: xtables sctp out-of-bounds read in match_flags() 10/9/2023
linux-headers core_unix.v0.14.0 Red Hat Medium CVE-2023-39193 - Kernel: netfilter: xtables sctp out-of-bounds read in match_flags() 10/9/2023
linux-headers core_unix.v0.17.0 Red Hat Medium CVE-2023-39193 - Kernel: netfilter: xtables sctp out-of-bounds read in match_flags() 10/9/2023
linux-headers core_unix.v0.15.1 Red Hat Medium CVE-2023-39193 - Kernel: netfilter: xtables sctp out-of-bounds read in match_flags() 10/9/2023
linux-headers core_unix.v0.17.1 Red Hat Medium CVE-2023-39193 - Kernel: netfilter: xtables sctp out-of-bounds read in match_flags() 10/9/2023
linux-headers core_unix.v0.15.1 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers core_unix.v0.15.2 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers core_unix.v0.17.0 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers core_unix.v0.17.1 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers core_unix.v0.15.0 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers core_unix.v0.14.0 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers core_unix.v0.15.0 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers core_unix.v0.15.1 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers core_unix.v0.17.0 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers core_unix.v0.15.2 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers core_unix.v0.14.0 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers core_unix.v0.17.1 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023