« List of all packages

shell

Opam page: https://opam.ocaml.org/packages/shell/

Versions

Version
shell.v0.17.0 (latest)
shell.v0.16.0
shell.v0.15.0
shell.v0.14.0
shell.v0.13.0
shell.v0.12.0

Vulnerable external dependencies (76440)

Product For package Vendor Severity CVE Published
linux-headers shell.v0.15.0 Linux Unknown CVE-2026-23229 - crypto: virtio - Add spinlock protection with virtqueue notification 2/18/2026
linux-headers shell.v0.13.0 Linux Unknown CVE-2026-23229 - crypto: virtio - Add spinlock protection with virtqueue notification 2/18/2026
linux-headers shell.v0.14.0 Linux Unknown CVE-2026-23229 - crypto: virtio - Add spinlock protection with virtqueue notification 2/18/2026
linux-headers shell.v0.12.0 Linux Unknown CVE-2026-23229 - crypto: virtio - Add spinlock protection with virtqueue notification 2/18/2026
linux-headers shell.v0.15.0 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
linux-headers shell.v0.16.0 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
linux-headers shell.v0.13.0 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
linux-headers shell.v0.17.0 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
linux-headers shell.v0.12.0 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
linux-headers shell.v0.14.0 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
linux-headers shell.v0.13.0 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers shell.v0.12.0 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers shell.v0.16.0 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers shell.v0.17.0 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers shell.v0.14.0 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers shell.v0.15.0 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers shell.v0.17.0 Linux High CVE-2026-23226 - ksmbd: add chann_lock to protect ksmbd_chann_list xarray 2/18/2026
linux-headers shell.v0.14.0 Linux High CVE-2026-23226 - ksmbd: add chann_lock to protect ksmbd_chann_list xarray 2/18/2026
linux-headers shell.v0.16.0 Linux High CVE-2026-23226 - ksmbd: add chann_lock to protect ksmbd_chann_list xarray 2/18/2026
linux-headers shell.v0.13.0 Linux High CVE-2026-23226 - ksmbd: add chann_lock to protect ksmbd_chann_list xarray 2/18/2026