| Version | |
|---|---|
| shell.v0.17.0 (latest) | |
| shell.v0.16.0 | |
| shell.v0.15.0 | |
| shell.v0.14.0 | |
| shell.v0.13.0 | |
| shell.v0.12.0 |
| Product | For package | Vendor | Severity | CVE | Published |
|---|---|---|---|---|---|
| linux-headers | shell.v0.16.0 | n/a | Unknown | CVE-2023-2156 | 5/9/2023 |
| linux-headers | shell.v0.17.0 | n/a | Unknown | CVE-2023-2156 | 5/9/2023 |
| linux-headers | shell.v0.14.0 | n/a | Unknown | CVE-2023-2156 | 5/9/2023 |
| linux-headers | shell.v0.15.0 | n/a | Unknown | CVE-2023-2156 | 5/9/2023 |
| linux-headers | shell.v0.13.0 | n/a | Unknown | CVE-2023-2124 | 5/15/2023 |
| linux-headers | shell.v0.17.0 | n/a | Unknown | CVE-2023-2124 | 5/15/2023 |
| linux-headers | shell.v0.12.0 | n/a | Unknown | CVE-2023-2124 | 5/15/2023 |
| linux-headers | shell.v0.14.0 | n/a | Unknown | CVE-2023-2124 | 5/15/2023 |
| linux-headers | shell.v0.16.0 | n/a | Unknown | CVE-2023-2124 | 5/15/2023 |
| linux-headers | shell.v0.15.0 | n/a | Unknown | CVE-2023-2124 | 5/15/2023 |
| linux-headers | shell.v0.17.0 | MediaTek, Inc. | Medium | CVE-2023-20850 | 9/4/2023 |
| linux-headers | shell.v0.13.0 | MediaTek, Inc. | Medium | CVE-2023-20850 | 9/4/2023 |
| linux-headers | shell.v0.14.0 | MediaTek, Inc. | Medium | CVE-2023-20850 | 9/4/2023 |
| linux-headers | shell.v0.12.0 | MediaTek, Inc. | Medium | CVE-2023-20850 | 9/4/2023 |
| linux-headers | shell.v0.16.0 | MediaTek, Inc. | Medium | CVE-2023-20850 | 9/4/2023 |
| linux-headers | shell.v0.15.0 | MediaTek, Inc. | Medium | CVE-2023-20850 | 9/4/2023 |
| linux-headers | shell.v0.17.0 | MediaTek, Inc. | Medium | CVE-2023-20849 | 9/4/2023 |
| linux-headers | shell.v0.16.0 | MediaTek, Inc. | Medium | CVE-2023-20849 | 9/4/2023 |
| linux-headers | shell.v0.14.0 | MediaTek, Inc. | Medium | CVE-2023-20849 | 9/4/2023 |
| linux-headers | shell.v0.15.0 | MediaTek, Inc. | Medium | CVE-2023-20849 | 9/4/2023 |