« List of all packages

mirage-block-unix

Opam page: https://opam.ocaml.org/packages/mirage-block-unix/

Versions

Version
mirage-block-unix.2.9.0 (latest)
mirage-block-unix.2.8.4
mirage-block-unix.2.8.3
mirage-block-unix.2.8.2
mirage-block-unix.2.14.2
mirage-block-unix.2.14.1
mirage-block-unix.2.14.0
mirage-block-unix.2.13.0
mirage-block-unix.2.12.1
mirage-block-unix.2.12.0
mirage-block-unix.2.11.2
mirage-block-unix.2.11.1
mirage-block-unix.2.11.0
mirage-block-unix.2.10.0

Vulnerable external dependencies (167174)

Product For package Vendor Severity CVE Published
linux-headers mirage-block-unix.2.11.2 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers mirage-block-unix.2.11.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-libc-dev mirage-block-unix.2.10.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
kernel-headers mirage-block-unix.2.10.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-libc-dev mirage-block-unix.2.8.4 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers mirage-block-unix.2.9.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers mirage-block-unix.2.8.3 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers mirage-block-unix.2.10.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers mirage-block-unix.2.8.4 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers mirage-block-unix.2.11.0 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers mirage-block-unix.2.11.0 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
kernel-headers mirage-block-unix.2.8.4 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers mirage-block-unix.2.8.2 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers mirage-block-unix.2.8.3 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers mirage-block-unix.2.8.2 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-libc-dev mirage-block-unix.2.9.0 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-libc-dev mirage-block-unix.2.8.4 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers mirage-block-unix.2.8.3 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
kernel-headers mirage-block-unix.2.8.4 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
kernel-headers mirage-block-unix.2.9.0 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024