« List of all packages

rawlink

Opam page: https://opam.ocaml.org/packages/rawlink/

Versions

Version
rawlink.2.1 (latest)
rawlink.1.2
rawlink.1.0

Vulnerable external dependencies (20)

Product For package Vendor Severity CVE Published
linux-headers rawlink.1.0 Linux Unknown CVE-2024-26815 - net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check 4/10/2024
linux-headers rawlink.1.0 Linux Unknown CVE-2024-26814 - vfio/fsl-mc: Block calling interrupt handler without trigger 4/5/2024
linux-headers rawlink.1.2 Linux Unknown CVE-2024-26814 - vfio/fsl-mc: Block calling interrupt handler without trigger 4/5/2024
linux-headers rawlink.2.1 Linux Unknown CVE-2024-26814 - vfio/fsl-mc: Block calling interrupt handler without trigger 4/5/2024
linux-headers rawlink.1.0 Linux Unknown CVE-2024-26813 - vfio/platform: Create persistent IRQ handlers 4/5/2024
linux-headers rawlink.2.1 Linux Unknown CVE-2024-26813 - vfio/platform: Create persistent IRQ handlers 4/5/2024
linux-headers rawlink.1.2 Linux Unknown CVE-2024-26813 - vfio/platform: Create persistent IRQ handlers 4/5/2024
linux-headers rawlink.2.1 Linux Unknown CVE-2024-26812 - vfio/pci: Create persistent INTx handler 4/5/2024
linux-headers rawlink.1.2 Linux Unknown CVE-2024-26812 - vfio/pci: Create persistent INTx handler 4/5/2024
linux-headers rawlink.1.0 Linux Unknown CVE-2024-26812 - vfio/pci: Create persistent INTx handler 4/5/2024
linux-headers rawlink.2.1 Linux Unknown CVE-2024-26811 - ksmbd: validate payload size in ipc response 4/8/2024
linux-headers rawlink.1.2 Linux Unknown CVE-2024-26811 - ksmbd: validate payload size in ipc response 4/8/2024
linux-headers rawlink.1.0 Linux Unknown CVE-2024-26811 - ksmbd: validate payload size in ipc response 4/8/2024
linux-headers rawlink.2.1 Linux Medium CVE-2024-26810 - vfio/pci: Lock external INTx masking ops 4/5/2024
linux-headers rawlink.1.2 Linux Medium CVE-2024-26810 - vfio/pci: Lock external INTx masking ops 4/5/2024
linux-headers rawlink.1.0 Linux Medium CVE-2024-26810 - vfio/pci: Lock external INTx masking ops 4/5/2024
linux-headers rawlink.1.0 Linux Unknown CVE-2024-26809 - netfilter: nft_set_pipapo: release elements in clone only from destroy path 4/4/2024
linux-headers rawlink.1.2 Linux Unknown CVE-2024-26809 - netfilter: nft_set_pipapo: release elements in clone only from destroy path 4/4/2024
linux-headers rawlink.2.1 Linux Unknown CVE-2024-26809 - netfilter: nft_set_pipapo: release elements in clone only from destroy path 4/4/2024
linux-headers rawlink.1.2 Linux Medium CVE-2024-26808 - netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain 4/4/2024