« List of all packages

rawlink-lwt

Opam page: https://opam.ocaml.org/packages/rawlink-lwt/

Versions

Version
rawlink-lwt.2.1 (latest)

Vulnerable external dependencies (11166)

Product For package Vendor Severity CVE Published
linux-headers rawlink-lwt.2.1 Linux Medium CVE-2024-22099 - NULL pointer deference in rfcomm_check_security in Linux kernel 1/25/2024
linux-headers rawlink-lwt.2.1 Linux Low CVE-2024-21803 - Possible UAF in bt_accept_poll in Linux kernel 1/30/2024
linux-headers rawlink-lwt.2.1 Fedora Medium CVE-2024-1312 - Kernel: race condition leads to use after free during vma lock in lock_vma_under_rcu 2/8/2024
linux-headers rawlink-lwt.2.1 Red Hat Medium CVE-2024-1312 - Kernel: race condition leads to use after free during vma lock in lock_vma_under_rcu 2/8/2024
linux-headers rawlink-lwt.2.1 n/a Medium CVE-2024-1312 - Kernel: race condition leads to use after free during vma lock in lock_vma_under_rcu 2/8/2024
linux-headers rawlink-lwt.2.1 Red Hat Medium CVE-2024-1151 - Kernel: stack overflow problem in open vswitch kernel module leading to dos 2/11/2024
linux-headers rawlink-lwt.2.1 Linux High CVE-2024-1086 - Use-after-free in Linux kernel's netfilter: nf_tables component 1/31/2024
linux-headers rawlink-lwt.2.1 Linux High CVE-2024-1085 - Use-after-free in Linux kernel's netfilter: nf_tables component 1/31/2024
linux-headers rawlink-lwt.2.1 Red Hat Medium CVE-2024-0841 - Kernel: hugetlbfs: null pointer dereference in hugetlbfs_fill_super function 1/28/2024
linux-headers rawlink-lwt.2.1 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers rawlink-lwt.2.1 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers rawlink-lwt.2.1 Red Hat High CVE-2024-0646 - Kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination 1/17/2024
linux-headers rawlink-lwt.2.1 High CVE-2024-0646 - Kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination 1/17/2024
linux-headers rawlink-lwt.2.1 Red Hat Medium CVE-2024-0641 - Kernel: deadlock leading to denial of service in tipc_crypto_key_revoke 1/17/2024
linux-headers rawlink-lwt.2.1 Medium CVE-2024-0641 - Kernel: deadlock leading to denial of service in tipc_crypto_key_revoke 1/17/2024
linux-headers rawlink-lwt.2.1 Red Hat Medium CVE-2024-0639 - Kernel: potential deadlock on &net->sctp.addr_wq_lock leading to dos 1/17/2024
linux-headers rawlink-lwt.2.1 Medium CVE-2024-0639 - Kernel: potential deadlock on &net->sctp.addr_wq_lock leading to dos 1/17/2024
linux-headers rawlink-lwt.2.1 Red Hat Medium CVE-2024-0607 - Kernel: nf_tables: pointer math issue in nft_byteorder_eval() 1/18/2024
linux-headers rawlink-lwt.2.1 Medium CVE-2024-0607 - Kernel: nf_tables: pointer math issue in nft_byteorder_eval() 1/18/2024
linux-headers rawlink-lwt.2.1 High CVE-2024-0582 - Kernel: io_uring: page use-after-free vulnerability via buffer ring mmap 1/16/2024