« List of all packages

xapi-stdext-unix

Opam page: https://opam.ocaml.org/packages/xapi-stdext-unix/

Versions

Version
xapi-stdext-unix.4.24.0 (latest)
xapi-stdext-unix.4.23.0
xapi-stdext-unix.4.22.0
xapi-stdext-unix.4.21.0
xapi-stdext-unix.4.20.0
xapi-stdext-unix.4.19.0
xapi-stdext-unix.4.16.0
xapi-stdext-unix.4.14.0

Vulnerable external dependencies (104608)

Product For package Vendor Severity CVE Published
linux-headers xapi-stdext-unix.4.24.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers xapi-stdext-unix.4.19.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers xapi-stdext-unix.4.23.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers xapi-stdext-unix.4.21.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers xapi-stdext-unix.4.22.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers xapi-stdext-unix.4.20.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers xapi-stdext-unix.4.14.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers xapi-stdext-unix.4.16.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers xapi-stdext-unix.4.19.0 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers xapi-stdext-unix.4.14.0 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers xapi-stdext-unix.4.14.0 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers xapi-stdext-unix.4.16.0 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers xapi-stdext-unix.4.19.0 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers xapi-stdext-unix.4.16.0 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers xapi-stdext-unix.4.21.0 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers xapi-stdext-unix.4.20.0 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers xapi-stdext-unix.4.24.0 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers xapi-stdext-unix.4.21.0 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers xapi-stdext-unix.4.23.0 Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024
linux-headers xapi-stdext-unix.4.23.0 Red Hat Medium CVE-2023-4134 - Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 11/14/2024