« List of all packages

xapi-stdext-unix

Opam page: https://opam.ocaml.org/packages/xapi-stdext-unix/

Versions

Version
xapi-stdext-unix.4.24.0 (latest)
xapi-stdext-unix.4.23.0
xapi-stdext-unix.4.22.0
xapi-stdext-unix.4.21.0
xapi-stdext-unix.4.20.0
xapi-stdext-unix.4.19.0
xapi-stdext-unix.4.16.0
xapi-stdext-unix.4.14.0

Vulnerable external dependencies (101744)

Product For package Vendor Severity CVE Published
linux-headers xapi-stdext-unix.4.23.0 Linux High CVE-2026-31588 - KVM: x86: Use scratch field in MMIO fragment to hold small write values 4/24/2026
linux-headers xapi-stdext-unix.4.14.0 Linux High CVE-2026-31588 - KVM: x86: Use scratch field in MMIO fragment to hold small write values 4/24/2026
linux-headers xapi-stdext-unix.4.24.0 Linux High CVE-2026-31588 - KVM: x86: Use scratch field in MMIO fragment to hold small write values 4/24/2026
linux-headers xapi-stdext-unix.4.16.0 Linux High CVE-2026-31588 - KVM: x86: Use scratch field in MMIO fragment to hold small write values 4/24/2026
linux-headers xapi-stdext-unix.4.19.0 Linux High CVE-2026-31588 - KVM: x86: Use scratch field in MMIO fragment to hold small write values 4/24/2026
linux-headers xapi-stdext-unix.4.22.0 Linux High CVE-2026-31588 - KVM: x86: Use scratch field in MMIO fragment to hold small write values 4/24/2026
linux-headers xapi-stdext-unix.4.21.0 Linux High CVE-2026-31588 - KVM: x86: Use scratch field in MMIO fragment to hold small write values 4/24/2026
linux-headers xapi-stdext-unix.4.20.0 Linux High CVE-2026-31588 - KVM: x86: Use scratch field in MMIO fragment to hold small write values 4/24/2026
linux-headers xapi-stdext-unix.4.22.0 Linux High CVE-2026-31587 - ASoC: qcom: q6apm: move component registration to unmanaged version 4/24/2026
linux-headers xapi-stdext-unix.4.24.0 Linux High CVE-2026-31587 - ASoC: qcom: q6apm: move component registration to unmanaged version 4/24/2026
linux-headers xapi-stdext-unix.4.19.0 Linux High CVE-2026-31587 - ASoC: qcom: q6apm: move component registration to unmanaged version 4/24/2026
linux-headers xapi-stdext-unix.4.16.0 Linux High CVE-2026-31587 - ASoC: qcom: q6apm: move component registration to unmanaged version 4/24/2026
linux-headers xapi-stdext-unix.4.21.0 Linux High CVE-2026-31587 - ASoC: qcom: q6apm: move component registration to unmanaged version 4/24/2026
linux-headers xapi-stdext-unix.4.14.0 Linux High CVE-2026-31587 - ASoC: qcom: q6apm: move component registration to unmanaged version 4/24/2026
linux-headers xapi-stdext-unix.4.20.0 Linux High CVE-2026-31587 - ASoC: qcom: q6apm: move component registration to unmanaged version 4/24/2026
linux-headers xapi-stdext-unix.4.23.0 Linux High CVE-2026-31587 - ASoC: qcom: q6apm: move component registration to unmanaged version 4/24/2026
linux-headers xapi-stdext-unix.4.19.0 Linux High CVE-2026-31586 - mm: blk-cgroup: fix use-after-free in cgwb_release_workfn() 4/24/2026
linux-headers xapi-stdext-unix.4.23.0 Linux High CVE-2026-31586 - mm: blk-cgroup: fix use-after-free in cgwb_release_workfn() 4/24/2026
linux-headers xapi-stdext-unix.4.22.0 Linux High CVE-2026-31586 - mm: blk-cgroup: fix use-after-free in cgwb_release_workfn() 4/24/2026
linux-headers xapi-stdext-unix.4.14.0 Linux High CVE-2026-31586 - mm: blk-cgroup: fix use-after-free in cgwb_release_workfn() 4/24/2026