| Version | |
|---|---|
| shell.v0.17.0 (latest) | |
| shell.v0.16.0 | |
| shell.v0.15.0 | |
| shell.v0.14.0 | |
| shell.v0.13.0 | |
| shell.v0.12.0 |
| Product | For package | Vendor | Severity | CVE | Published |
|---|---|---|---|---|---|
| linux-headers | shell.v0.14.0 | n/a | Medium | CVE-2023-3159 | 6/12/2023 |
| linux-headers | shell.v0.13.0 | n/a | Medium | CVE-2023-3159 | 6/12/2023 |
| linux-headers | shell.v0.12.0 | n/a | Medium | CVE-2023-3159 | 6/12/2023 |
| linux-headers | shell.v0.15.0 | n/a | Medium | CVE-2023-3159 | 6/12/2023 |
| linux-headers | shell.v0.17.0 | n/a | Medium | CVE-2023-3159 | 6/12/2023 |
| linux-headers | shell.v0.16.0 | n/a | Medium | CVE-2023-3159 | 6/12/2023 |
| linux-headers | shell.v0.16.0 | n/a | High | CVE-2023-31436 | 4/28/2023 |
| linux-headers | shell.v0.15.0 | n/a | High | CVE-2023-31436 | 4/28/2023 |
| linux-headers | shell.v0.12.0 | n/a | High | CVE-2023-31436 | 4/28/2023 |
| linux-headers | shell.v0.13.0 | n/a | High | CVE-2023-31436 | 4/28/2023 |
| linux-headers | shell.v0.14.0 | n/a | High | CVE-2023-31436 | 4/28/2023 |
| linux-headers | shell.v0.17.0 | n/a | High | CVE-2023-31436 | 4/28/2023 |
| linux-headers | shell.v0.15.0 | n/a | High | CVE-2023-3141 | 6/9/2023 |
| linux-headers | shell.v0.16.0 | n/a | High | CVE-2023-3141 | 6/9/2023 |
| linux-headers | shell.v0.12.0 | n/a | High | CVE-2023-3141 | 6/9/2023 |
| linux-headers | shell.v0.17.0 | n/a | High | CVE-2023-3141 | 6/9/2023 |
| linux-headers | shell.v0.14.0 | n/a | High | CVE-2023-3141 | 6/9/2023 |
| linux-headers | shell.v0.13.0 | n/a | High | CVE-2023-3141 | 6/9/2023 |
| linux-headers | shell.v0.12.0 | Linux | High | CVE-2023-31248 - Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability | 7/5/2023 |
| linux-headers | shell.v0.14.0 | Linux | High | CVE-2023-31248 - Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability | 7/5/2023 |