« List of all packages

xapi-stdext-unix

Opam page: https://opam.ocaml.org/packages/xapi-stdext-unix/

Versions

Version
xapi-stdext-unix.4.24.0 (latest)
xapi-stdext-unix.4.23.0
xapi-stdext-unix.4.22.0
xapi-stdext-unix.4.21.0
xapi-stdext-unix.4.20.0
xapi-stdext-unix.4.19.0
xapi-stdext-unix.4.16.0
xapi-stdext-unix.4.14.0

Vulnerable external dependencies (101960)

Product For package Vendor Severity CVE Published
linux-headers xapi-stdext-unix.4.16.0 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.16.0 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.22.0 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.19.0 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.14.0 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.24.0 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.14.0 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.19.0 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.20.0 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.21.0 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.20.0 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.22.0 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.21.0 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.23.0 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.24.0 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.23.0 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers xapi-stdext-unix.4.20.0 High CVE-2024-0646 - Kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination 1/17/2024
linux-headers xapi-stdext-unix.4.21.0 Red Hat High CVE-2024-0646 - Kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination 1/17/2024
linux-headers xapi-stdext-unix.4.23.0 High CVE-2024-0646 - Kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination 1/17/2024
linux-headers xapi-stdext-unix.4.24.0 High CVE-2024-0646 - Kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination 1/17/2024