« List of all packages

rawlink

Opam page: https://opam.ocaml.org/packages/rawlink/

Versions

Version
rawlink.2.1 (latest)
rawlink.1.2
rawlink.1.0

Vulnerable external dependencies (38637)

Product For package Vendor Severity CVE Published
linux-headers rawlink.2.1 Linux Unknown CVE-2024-36481 - tracing/probes: fix error check in parse_btf_field() 6/21/2024
linux-headers rawlink.1.0 Linux Unknown CVE-2024-36479 - fpga: bridge: add owner module and take its refcount 6/24/2024
linux-headers rawlink.2.1 Linux Unknown CVE-2024-36479 - fpga: bridge: add owner module and take its refcount 6/24/2024
linux-headers rawlink.1.2 Linux Unknown CVE-2024-36479 - fpga: bridge: add owner module and take its refcount 6/24/2024
linux-headers rawlink.2.1 Linux Unknown CVE-2024-36478 - null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' 6/21/2024
linux-headers rawlink.1.0 Linux Unknown CVE-2024-36478 - null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' 6/21/2024
linux-headers rawlink.1.2 Linux Unknown CVE-2024-36478 - null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' 6/21/2024
linux-headers rawlink.1.2 Linux Unknown CVE-2024-36477 - tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer 6/21/2024
linux-headers rawlink.2.1 Linux Unknown CVE-2024-36477 - tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer 6/21/2024
linux-headers rawlink.1.0 Linux Unknown CVE-2024-36477 - tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer 6/21/2024
linux-headers rawlink.1.0 Linux Medium CVE-2024-36476 - RDMA/rtrs: Ensure 'ib_sge list' is accessible 1/15/2025
linux-headers rawlink.1.2 Linux Medium CVE-2024-36476 - RDMA/rtrs: Ensure 'ib_sge list' is accessible 1/15/2025
linux-headers rawlink.2.1 Linux Medium CVE-2024-36476 - RDMA/rtrs: Ensure 'ib_sge list' is accessible 1/15/2025
linux-headers rawlink.1.2 Linux Unknown CVE-2024-36288 - SUNRPC: Fix loop termination condition in gss_free_in_token_pages() 6/21/2024
linux-headers rawlink.2.1 Linux Unknown CVE-2024-36288 - SUNRPC: Fix loop termination condition in gss_free_in_token_pages() 6/21/2024
linux-headers rawlink.1.0 Linux Unknown CVE-2024-36288 - SUNRPC: Fix loop termination condition in gss_free_in_token_pages() 6/21/2024
linux-headers rawlink.1.2 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers rawlink.1.0 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers rawlink.2.1 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers rawlink.1.2 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024