« List of all packages

tracy-client

Opam page: https://opam.ocaml.org/packages/tracy-client/

Versions

Version
tracy-client.0.6 (latest)
tracy-client.0.5.2
tracy-client.0.5.1
tracy-client.0.5
tracy-client.0.4
tracy-client.0.3
tracy-client.0.2
tracy-client.0.1

Vulnerable external dependencies (92168)

Product For package Vendor Severity CVE Published
linux-headers tracy-client.0.2 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers tracy-client.0.1 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers tracy-client.0.4 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers tracy-client.0.5.2 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers tracy-client.0.5.1 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers tracy-client.0.6 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers tracy-client.0.3 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers tracy-client.0.5 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers tracy-client.0.5.2 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers tracy-client.0.2 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers tracy-client.0.5 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers tracy-client.0.1 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers tracy-client.0.3 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers tracy-client.0.5.1 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers tracy-client.0.6 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers tracy-client.0.4 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers tracy-client.0.6 Linux Unknown CVE-2024-36244 - net/sched: taprio: extend minimum interval restriction to entire cycle too 6/21/2024
linux-headers tracy-client.0.3 Linux Unknown CVE-2024-36244 - net/sched: taprio: extend minimum interval restriction to entire cycle too 6/21/2024
linux-headers tracy-client.0.1 Linux Unknown CVE-2024-36244 - net/sched: taprio: extend minimum interval restriction to entire cycle too 6/21/2024
linux-headers tracy-client.0.4 Linux Unknown CVE-2024-36244 - net/sched: taprio: extend minimum interval restriction to entire cycle too 6/21/2024