« List of all packages

xapi-stdext-unix

Opam page: https://opam.ocaml.org/packages/xapi-stdext-unix/

Versions

Version
xapi-stdext-unix.4.24.0 (latest)
xapi-stdext-unix.4.23.0
xapi-stdext-unix.4.22.0
xapi-stdext-unix.4.21.0
xapi-stdext-unix.4.20.0
xapi-stdext-unix.4.19.0
xapi-stdext-unix.4.16.0
xapi-stdext-unix.4.14.0

Vulnerable external dependencies (99256)

Product For package Vendor Severity CVE Published
linux-headers xapi-stdext-unix.4.16.0 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers xapi-stdext-unix.4.19.0 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers xapi-stdext-unix.4.21.0 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers xapi-stdext-unix.4.14.0 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers xapi-stdext-unix.4.20.0 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers xapi-stdext-unix.4.24.0 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers xapi-stdext-unix.4.23.0 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers xapi-stdext-unix.4.22.0 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers xapi-stdext-unix.4.24.0 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers xapi-stdext-unix.4.14.0 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers xapi-stdext-unix.4.20.0 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers xapi-stdext-unix.4.22.0 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers xapi-stdext-unix.4.23.0 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers xapi-stdext-unix.4.16.0 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers xapi-stdext-unix.4.19.0 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers xapi-stdext-unix.4.21.0 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers xapi-stdext-unix.4.24.0 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers xapi-stdext-unix.4.23.0 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers xapi-stdext-unix.4.21.0 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers xapi-stdext-unix.4.22.0 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024