« List of all packages

shell

Opam page: https://opam.ocaml.org/packages/shell/

Versions

Version
shell.v0.17.0 (latest)
shell.v0.16.0
shell.v0.15.0
shell.v0.14.0
shell.v0.13.0
shell.v0.12.0

Vulnerable external dependencies (74442)

Product For package Vendor Severity CVE Published
linux-headers shell.v0.12.0 Linux High CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component 9/6/2023
linux-headers shell.v0.14.0 Linux High CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component 9/6/2023
linux-headers shell.v0.15.0 Linux High CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component 9/6/2023
linux-headers shell.v0.16.0 Linux High CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component 9/6/2023
linux-headers shell.v0.14.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers shell.v0.13.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers shell.v0.12.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers shell.v0.16.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers shell.v0.15.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers shell.v0.17.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers shell.v0.15.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers shell.v0.13.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers shell.v0.12.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers shell.v0.17.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers shell.v0.14.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers shell.v0.16.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers shell.v0.14.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers shell.v0.15.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers shell.v0.13.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers shell.v0.16.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023