« List of all packages

tracy-client

Opam page: https://opam.ocaml.org/packages/tracy-client/

Versions

Version
tracy-client.0.7 (latest)
tracy-client.0.6
tracy-client.0.5.2
tracy-client.0.5.1
tracy-client.0.5
tracy-client.0.4
tracy-client.0.3
tracy-client.0.2
tracy-client.0.1

Vulnerable external dependencies (111654)

Product For package Vendor Severity CVE Published
linux-headers tracy-client.0.1 Linux High CVE-2024-50261 - macsec: Fix use-after-free while sending the offloading packet 11/9/2024
linux-headers tracy-client.0.5 Linux High CVE-2024-50261 - macsec: Fix use-after-free while sending the offloading packet 11/9/2024
linux-headers tracy-client.0.7 Linux High CVE-2024-50261 - macsec: Fix use-after-free while sending the offloading packet 11/9/2024
linux-headers tracy-client.0.4 Linux Medium CVE-2024-50260 - sock_map: fix a NULL pointer dereference in sock_map_link_update_prog() 11/9/2024
linux-headers tracy-client.0.3 Linux Medium CVE-2024-50260 - sock_map: fix a NULL pointer dereference in sock_map_link_update_prog() 11/9/2024
linux-headers tracy-client.0.5 Linux Medium CVE-2024-50260 - sock_map: fix a NULL pointer dereference in sock_map_link_update_prog() 11/9/2024
linux-headers tracy-client.0.7 Linux Medium CVE-2024-50260 - sock_map: fix a NULL pointer dereference in sock_map_link_update_prog() 11/9/2024
linux-headers tracy-client.0.1 Linux Medium CVE-2024-50260 - sock_map: fix a NULL pointer dereference in sock_map_link_update_prog() 11/9/2024
linux-headers tracy-client.0.2 Linux Medium CVE-2024-50260 - sock_map: fix a NULL pointer dereference in sock_map_link_update_prog() 11/9/2024
linux-headers tracy-client.0.5.1 Linux Medium CVE-2024-50260 - sock_map: fix a NULL pointer dereference in sock_map_link_update_prog() 11/9/2024
linux-headers tracy-client.0.5.2 Linux Medium CVE-2024-50260 - sock_map: fix a NULL pointer dereference in sock_map_link_update_prog() 11/9/2024
linux-headers tracy-client.0.6 Linux Medium CVE-2024-50260 - sock_map: fix a NULL pointer dereference in sock_map_link_update_prog() 11/9/2024
linux-headers tracy-client.0.5.2 Linux Medium CVE-2024-50259 - netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() 11/9/2024
linux-headers tracy-client.0.6 Linux Medium CVE-2024-50259 - netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() 11/9/2024
linux-headers tracy-client.0.7 Linux Medium CVE-2024-50259 - netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() 11/9/2024
linux-headers tracy-client.0.3 Linux Medium CVE-2024-50259 - netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() 11/9/2024
linux-headers tracy-client.0.4 Linux Medium CVE-2024-50259 - netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() 11/9/2024
linux-headers tracy-client.0.5 Linux Medium CVE-2024-50259 - netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() 11/9/2024
linux-headers tracy-client.0.5.1 Linux Medium CVE-2024-50259 - netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() 11/9/2024
linux-headers tracy-client.0.1 Linux Medium CVE-2024-50259 - netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() 11/9/2024