« List of all packages

rawlink

Opam page: https://opam.ocaml.org/packages/rawlink/

Versions

Version
rawlink.2.1 (latest)
rawlink.1.2
rawlink.1.0

Vulnerable external dependencies (36897)

Product For package Vendor Severity CVE Published
linux-headers rawlink.2.1 Red Hat High CVE-2023-6546 - Kernel: gsm multiplexing race condition leads to privilege escalation 12/21/2023
linux-headers rawlink.1.0 Red Hat High CVE-2023-6546 - Kernel: gsm multiplexing race condition leads to privilege escalation 12/21/2023
linux-headers rawlink.1.2 Red Hat High CVE-2023-6546 - Kernel: gsm multiplexing race condition leads to privilege escalation 12/21/2023
linux-headers rawlink.1.0 Red Hat Medium CVE-2023-6536 - Kernel: null pointer dereference in __nvmet_req_complete 2/7/2024
linux-headers rawlink.1.2 Red Hat Medium CVE-2023-6536 - Kernel: null pointer dereference in __nvmet_req_complete 2/7/2024
linux-headers rawlink.2.1 Red Hat Medium CVE-2023-6536 - Kernel: null pointer dereference in __nvmet_req_complete 2/7/2024
linux-headers rawlink.1.2 Red Hat High CVE-2023-6531 - Kernel: gc's deletion of an skb races with unix_stream_read_generic() leading to uaf 1/21/2024
linux-headers rawlink.1.0 Red Hat High CVE-2023-6531 - Kernel: gc's deletion of an skb races with unix_stream_read_generic() leading to uaf 1/21/2024
linux-headers rawlink.2.1 Red Hat High CVE-2023-6531 - Kernel: gc's deletion of an skb races with unix_stream_read_generic() leading to uaf 1/21/2024
linux-headers rawlink.2.1 Red Hat Medium CVE-2023-6356 - Kernel: null pointer dereference in nvmet_tcp_build_iovec 2/7/2024
linux-headers rawlink.1.2 Red Hat Medium CVE-2023-6356 - Kernel: null pointer dereference in nvmet_tcp_build_iovec 2/7/2024
linux-headers rawlink.1.0 Red Hat Medium CVE-2023-6356 - Kernel: null pointer dereference in nvmet_tcp_build_iovec 2/7/2024
linux-headers rawlink.1.2 Red Hat High CVE-2023-6270 - Kernel: aoe: improper reference count leads to use-after-free vulnerability 1/4/2024
linux-headers rawlink.1.0 Red Hat High CVE-2023-6270 - Kernel: aoe: improper reference count leads to use-after-free vulnerability 1/4/2024
linux-headers rawlink.2.1 Red Hat High CVE-2023-6270 - Kernel: aoe: improper reference count leads to use-after-free vulnerability 1/4/2024
linux-headers rawlink.2.1 Red Hat High CVE-2023-6200 - Kernel: icmpv6 router advertisement packets, aka linux tcp/ip remote code execution vulnerability 1/28/2024
linux-headers rawlink.1.2 Red Hat High CVE-2023-6200 - Kernel: icmpv6 router advertisement packets, aka linux tcp/ip remote code execution vulnerability 1/28/2024
linux-headers rawlink.1.0 Fedora High CVE-2023-6200 - Kernel: icmpv6 router advertisement packets, aka linux tcp/ip remote code execution vulnerability 1/28/2024
linux-headers rawlink.1.0 Red Hat High CVE-2023-6200 - Kernel: icmpv6 router advertisement packets, aka linux tcp/ip remote code execution vulnerability 1/28/2024
linux-headers rawlink.1.2 n/a High CVE-2023-6200 - Kernel: icmpv6 router advertisement packets, aka linux tcp/ip remote code execution vulnerability 1/28/2024