« List of all packages

hvsock

Opam page: https://opam.ocaml.org/packages/hvsock/

Versions

Version
hvsock.3.1.0 (latest)
hvsock.3.0.1
hvsock.3.0.0
hvsock.2.0.0
hvsock.1.0.2

Vulnerable external dependencies (114624)

Product For package Vendor Severity CVE Published
kernel-headers hvsock.2.0.0 Linux High CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component 9/6/2023
linux-headers hvsock.3.1.0 Linux High CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component 9/6/2023
linux-headers hvsock.3.1.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-libc-dev hvsock.2.0.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
kernel-headers hvsock.2.0.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers hvsock.3.0.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
kernel-headers hvsock.3.0.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-libc-dev hvsock.3.1.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
kernel-headers hvsock.3.1.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers hvsock.2.0.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-libc-dev hvsock.3.0.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-libc-dev hvsock.2.0.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers hvsock.2.0.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-libc-dev hvsock.3.0.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
kernel-headers hvsock.2.0.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
kernel-headers hvsock.3.0.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers hvsock.3.0.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
kernel-headers hvsock.3.1.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-libc-dev hvsock.3.1.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers hvsock.3.1.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023