« List of all packages

restricted

Opam page: https://opam.ocaml.org/packages/restricted/

Versions

Version
restricted.2.0.0 (latest)
restricted.1.2.0
restricted.1.1

Vulnerable external dependencies (25480)

Product For package Vendor Severity CVE Published
linux-headers restricted.1.2.0 Linux Medium CVE-2025-21642 - mptcp: sysctl: sched: avoid using current->nsproxy 1/19/2025
linux-headers restricted.2.0.0 Linux Medium CVE-2025-21642 - mptcp: sysctl: sched: avoid using current->nsproxy 1/19/2025
linux-headers restricted.2.0.0 Linux Medium CVE-2025-21641 - mptcp: sysctl: blackhole timeout: avoid using current->nsproxy 1/19/2025
linux-headers restricted.1.2.0 Linux Medium CVE-2025-21641 - mptcp: sysctl: blackhole timeout: avoid using current->nsproxy 1/19/2025
linux-headers restricted.1.2.0 Linux Unknown CVE-2025-21640 - sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy 1/19/2025
linux-headers restricted.2.0.0 Linux Unknown CVE-2025-21640 - sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy 1/19/2025
linux-headers restricted.2.0.0 Linux Medium CVE-2025-21639 - sctp: sysctl: rto_min/max: avoid using current->nsproxy 1/19/2025
linux-headers restricted.1.2.0 Linux Medium CVE-2025-21639 - sctp: sysctl: rto_min/max: avoid using current->nsproxy 1/19/2025
linux-headers restricted.2.0.0 Linux Unknown CVE-2025-21638 - sctp: sysctl: auth_enable: avoid using current->nsproxy 1/19/2025
linux-headers restricted.1.2.0 Linux Unknown CVE-2025-21638 - sctp: sysctl: auth_enable: avoid using current->nsproxy 1/19/2025
linux-headers restricted.1.2.0 Linux Medium CVE-2025-21637 - sctp: sysctl: udp_port: avoid using current->nsproxy 1/19/2025
linux-headers restricted.2.0.0 Linux Medium CVE-2025-21637 - sctp: sysctl: udp_port: avoid using current->nsproxy 1/19/2025
linux-headers restricted.2.0.0 Linux Medium CVE-2025-21636 - sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy 1/19/2025
linux-headers restricted.1.2.0 Linux Medium CVE-2025-21636 - sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy 1/19/2025
linux-headers restricted.2.0.0 Linux Medium CVE-2025-21635 - rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy 1/19/2025
linux-headers restricted.1.2.0 Linux Medium CVE-2025-21635 - rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy 1/19/2025
linux-headers restricted.2.0.0 Linux Medium CVE-2025-21634 - cgroup/cpuset: remove kernfs active break 1/19/2025
linux-headers restricted.1.2.0 Linux Medium CVE-2025-21634 - cgroup/cpuset: remove kernfs active break 1/19/2025
linux-headers restricted.2.0.0 Linux Unknown CVE-2025-21632 - x86/fpu: Ensure shadow stack is active before "getting" registers 1/19/2025
linux-headers restricted.1.2.0 Linux Unknown CVE-2025-21632 - x86/fpu: Ensure shadow stack is active before "getting" registers 1/19/2025