| Version | |
|---|---|
| hvsock.3.1.0 (latest) | |
| hvsock.3.0.1 | |
| hvsock.3.0.0 | |
| hvsock.2.0.0 | |
| hvsock.1.0.2 |
| Product | For package | Vendor | Severity | CVE | Published |
|---|---|---|---|---|---|
| linux-libc-dev | hvsock.3.0.0 | n/a | Medium | CVE-2023-33203 | 5/18/2023 |
| linux-libc-dev | hvsock.3.0.0 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| kernel-headers | hvsock.3.0.0 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| linux-libc-dev | hvsock.2.0.0 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| linux-headers | hvsock.3.0.0 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| kernel-headers | hvsock.2.0.0 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| kernel-headers | hvsock.3.1.0 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| linux-headers | hvsock.3.1.0 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| linux-headers | hvsock.2.0.0 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| linux-libc-dev | hvsock.3.1.0 | n/a | High | CVE-2023-3317 | 6/23/2023 |
| linux-libc-dev | hvsock.2.0.0 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| linux-libc-dev | hvsock.3.0.0 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| linux-headers | hvsock.2.0.0 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| linux-headers | hvsock.3.1.0 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| linux-headers | hvsock.3.0.0 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| linux-libc-dev | hvsock.3.1.0 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| kernel-headers | hvsock.2.0.0 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| kernel-headers | hvsock.3.1.0 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| kernel-headers | hvsock.3.0.0 | n/a | High | CVE-2023-3312 | 6/19/2023 |
| kernel-headers | hvsock.3.0.0 | Red Hat | High | CVE-2023-3269 - Distros-[dirtyvma] privilege escalation via non-rcu-protected vma traversal | 7/11/2023 |