« List of all packages

restricted

Opam page: https://opam.ocaml.org/packages/restricted/

Versions

Version
restricted.2.0.0 (latest)
restricted.1.2.0
restricted.1.1

Vulnerable external dependencies (25480)

Product For package Vendor Severity CVE Published
linux-headers restricted.2.0.0 Linux Unknown CVE-2024-36477 - tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer 6/21/2024
linux-headers restricted.1.2.0 Linux Unknown CVE-2024-36477 - tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer 6/21/2024
linux-headers restricted.1.2.0 Linux Medium CVE-2024-36476 - RDMA/rtrs: Ensure 'ib_sge list' is accessible 1/15/2025
linux-headers restricted.2.0.0 Linux Medium CVE-2024-36476 - RDMA/rtrs: Ensure 'ib_sge list' is accessible 1/15/2025
linux-headers restricted.1.2.0 Linux Unknown CVE-2024-36288 - SUNRPC: Fix loop termination condition in gss_free_in_token_pages() 6/21/2024
linux-headers restricted.2.0.0 Linux Unknown CVE-2024-36288 - SUNRPC: Fix loop termination condition in gss_free_in_token_pages() 6/21/2024
linux-headers restricted.1.2.0 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers restricted.2.0.0 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers restricted.1.2.0 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers restricted.2.0.0 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers restricted.1.2.0 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers restricted.2.0.0 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers restricted.1.2.0 Linux Unknown CVE-2024-36244 - net/sched: taprio: extend minimum interval restriction to entire cycle too 6/21/2024
linux-headers restricted.2.0.0 Linux Unknown CVE-2024-36244 - net/sched: taprio: extend minimum interval restriction to entire cycle too 6/21/2024
linux-headers restricted.2.0.0 Linux Unknown CVE-2024-36033 - Bluetooth: qca: fix info leak when fetching board id 5/30/2024
linux-headers restricted.1.2.0 Linux Unknown CVE-2024-36033 - Bluetooth: qca: fix info leak when fetching board id 5/30/2024
linux-headers restricted.2.0.0 Linux Low CVE-2024-36032 - Bluetooth: qca: fix info leak when fetching fw build id 5/30/2024
linux-headers restricted.1.2.0 Linux Low CVE-2024-36032 - Bluetooth: qca: fix info leak when fetching fw build id 5/30/2024
linux-headers restricted.2.0.0 Linux Critical CVE-2024-36031 - keys: Fix overwrite of key expiration on instantiation 5/30/2024
linux-headers restricted.1.2.0 Linux Critical CVE-2024-36031 - keys: Fix overwrite of key expiration on instantiation 5/30/2024