« List of all packages

core_unix

Opam page: https://opam.ocaml.org/packages/core_unix/

Versions

Version
core_unix.v0.17.1 (latest)
core_unix.v0.17.0
core_unix.v0.16.0
core_unix.v0.15.2
core_unix.v0.15.1
core_unix.v0.15.0
core_unix.v0.14.0

Vulnerable external dependencies (71448)

Product For package Vendor Severity CVE Published
linux-headers core_unix.v0.17.0 Linux Unknown CVE-2025-38432 - net: netpoll: Initialize UDP checksum field before checksumming 7/25/2025
linux-headers core_unix.v0.15.2 Linux Unknown CVE-2025-38432 - net: netpoll: Initialize UDP checksum field before checksumming 7/25/2025
linux-headers core_unix.v0.14.0 Linux Unknown CVE-2025-38432 - net: netpoll: Initialize UDP checksum field before checksumming 7/25/2025
linux-headers core_unix.v0.15.0 Linux Unknown CVE-2025-38432 - net: netpoll: Initialize UDP checksum field before checksumming 7/25/2025
linux-headers core_unix.v0.15.1 Linux Unknown CVE-2025-38432 - net: netpoll: Initialize UDP checksum field before checksumming 7/25/2025
linux-headers core_unix.v0.17.1 Linux Unknown CVE-2025-38432 - net: netpoll: Initialize UDP checksum field before checksumming 7/25/2025
linux-headers core_unix.v0.15.0 Linux Unknown CVE-2025-38431 - smb: client: fix regression with native SMB symlinks 7/25/2025
linux-headers core_unix.v0.15.1 Linux Unknown CVE-2025-38431 - smb: client: fix regression with native SMB symlinks 7/25/2025
linux-headers core_unix.v0.17.1 Linux Unknown CVE-2025-38431 - smb: client: fix regression with native SMB symlinks 7/25/2025
linux-headers core_unix.v0.14.0 Linux Unknown CVE-2025-38431 - smb: client: fix regression with native SMB symlinks 7/25/2025
linux-headers core_unix.v0.15.2 Linux Unknown CVE-2025-38431 - smb: client: fix regression with native SMB symlinks 7/25/2025
linux-headers core_unix.v0.17.0 Linux Unknown CVE-2025-38431 - smb: client: fix regression with native SMB symlinks 7/25/2025
linux-headers core_unix.v0.17.0 Linux Unknown CVE-2025-38430 - nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request 7/25/2025
linux-headers core_unix.v0.15.1 Linux Unknown CVE-2025-38430 - nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request 7/25/2025
linux-headers core_unix.v0.15.2 Linux Unknown CVE-2025-38430 - nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request 7/25/2025
linux-headers core_unix.v0.14.0 Linux Unknown CVE-2025-38430 - nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request 7/25/2025
linux-headers core_unix.v0.15.0 Linux Unknown CVE-2025-38430 - nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request 7/25/2025
linux-headers core_unix.v0.17.1 Linux Unknown CVE-2025-38430 - nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request 7/25/2025
linux-headers core_unix.v0.15.0 Linux Unknown CVE-2025-38429 - bus: mhi: ep: Update read pointer only after buffer is written 7/25/2025
linux-headers core_unix.v0.15.1 Linux Unknown CVE-2025-38429 - bus: mhi: ep: Update read pointer only after buffer is written 7/25/2025