« List of all packages

rawlink

Opam page: https://opam.ocaml.org/packages/rawlink/

Versions

Version
rawlink.2.1 (latest)
rawlink.1.2
rawlink.1.0

Vulnerable external dependencies (33864)

Product For package Vendor Severity CVE Published
linux-headers rawlink.1.0 Medium CVE-2024-0565 - Kernel: cifs filesystem decryption improper input validation remote code execution vulnerability in function receive_encrypted_standard of client 1/15/2024
linux-headers rawlink.2.1 Medium CVE-2024-0565 - Kernel: cifs filesystem decryption improper input validation remote code execution vulnerability in function receive_encrypted_standard of client 1/15/2024
linux-headers rawlink.2.1 Red Hat Medium CVE-2024-0565 - Kernel: cifs filesystem decryption improper input validation remote code execution vulnerability in function receive_encrypted_standard of client 1/15/2024
linux-headers rawlink.2.1 Red Hat Medium CVE-2024-0564 - Kernel: max page sharing of kernel samepage merging (ksm) may cause memory deduplication 1/30/2024
linux-headers rawlink.1.2 Red Hat Medium CVE-2024-0564 - Kernel: max page sharing of kernel samepage merging (ksm) may cause memory deduplication 1/30/2024
linux-headers rawlink.1.0 Red Hat Medium CVE-2024-0564 - Kernel: max page sharing of kernel samepage merging (ksm) may cause memory deduplication 1/30/2024
linux-headers rawlink.1.0 Medium CVE-2024-0564 - Kernel: max page sharing of kernel samepage merging (ksm) may cause memory deduplication 1/30/2024
linux-headers rawlink.1.2 Medium CVE-2024-0564 - Kernel: max page sharing of kernel samepage merging (ksm) may cause memory deduplication 1/30/2024
linux-headers rawlink.2.1 Medium CVE-2024-0564 - Kernel: max page sharing of kernel samepage merging (ksm) may cause memory deduplication 1/30/2024
linux-headers rawlink.2.1 High CVE-2024-0562 - Kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c 1/15/2024
linux-headers rawlink.2.1 Red Hat High CVE-2024-0562 - Kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c 1/15/2024
linux-headers rawlink.1.2 Red Hat High CVE-2024-0562 - Kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c 1/15/2024
linux-headers rawlink.1.0 High CVE-2024-0562 - Kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c 1/15/2024
linux-headers rawlink.1.2 High CVE-2024-0562 - Kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c 1/15/2024
linux-headers rawlink.1.0 Red Hat High CVE-2024-0562 - Kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c 1/15/2024
linux-headers rawlink.1.2 Medium CVE-2024-0443 - Kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline. 1/11/2024
linux-headers rawlink.1.2 Red Hat Medium CVE-2024-0443 - Kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline. 1/11/2024
linux-headers rawlink.1.0 Medium CVE-2024-0443 - Kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline. 1/11/2024
linux-headers rawlink.1.0 Red Hat Medium CVE-2024-0443 - Kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline. 1/11/2024
linux-headers rawlink.2.1 Red Hat Medium CVE-2024-0443 - Kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline. 1/11/2024