« List of all packages

tracy-client

Opam page: https://opam.ocaml.org/packages/tracy-client/

Versions

Version
tracy-client.0.6 (latest)
tracy-client.0.5.2
tracy-client.0.5.1
tracy-client.0.5
tracy-client.0.4
tracy-client.0.3
tracy-client.0.2
tracy-client.0.1

Vulnerable external dependencies (92168)

Product For package Vendor Severity CVE Published
linux-headers tracy-client.0.5.1 Linux Unknown CVE-2024-35997 - HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up 5/20/2024
linux-headers tracy-client.0.4 Linux Unknown CVE-2024-35997 - HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up 5/20/2024
linux-headers tracy-client.0.2 Linux Unknown CVE-2024-35997 - HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up 5/20/2024
linux-headers tracy-client.0.3 Linux Unknown CVE-2024-35997 - HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up 5/20/2024
linux-headers tracy-client.0.1 Linux Unknown CVE-2024-35996 - cpu: Re-enable CPU mitigations by default for !X86 architectures 5/20/2024
linux-headers tracy-client.0.3 Linux Unknown CVE-2024-35996 - cpu: Re-enable CPU mitigations by default for !X86 architectures 5/20/2024
linux-headers tracy-client.0.2 Linux Unknown CVE-2024-35996 - cpu: Re-enable CPU mitigations by default for !X86 architectures 5/20/2024
linux-headers tracy-client.0.5.1 Linux Unknown CVE-2024-35996 - cpu: Re-enable CPU mitigations by default for !X86 architectures 5/20/2024
linux-headers tracy-client.0.5 Linux Unknown CVE-2024-35996 - cpu: Re-enable CPU mitigations by default for !X86 architectures 5/20/2024
linux-headers tracy-client.0.5.2 Linux Unknown CVE-2024-35996 - cpu: Re-enable CPU mitigations by default for !X86 architectures 5/20/2024
linux-headers tracy-client.0.6 Linux Unknown CVE-2024-35996 - cpu: Re-enable CPU mitigations by default for !X86 architectures 5/20/2024
linux-headers tracy-client.0.4 Linux Unknown CVE-2024-35996 - cpu: Re-enable CPU mitigations by default for !X86 architectures 5/20/2024
linux-headers tracy-client.0.5 Linux Unknown CVE-2024-35995 - ACPI: CPPC: Use access_width over bit_width for system memory accesses 5/20/2024
linux-headers tracy-client.0.4 Linux Unknown CVE-2024-35995 - ACPI: CPPC: Use access_width over bit_width for system memory accesses 5/20/2024
linux-headers tracy-client.0.6 Linux Unknown CVE-2024-35995 - ACPI: CPPC: Use access_width over bit_width for system memory accesses 5/20/2024
linux-headers tracy-client.0.2 Linux Unknown CVE-2024-35995 - ACPI: CPPC: Use access_width over bit_width for system memory accesses 5/20/2024
linux-headers tracy-client.0.1 Linux Unknown CVE-2024-35995 - ACPI: CPPC: Use access_width over bit_width for system memory accesses 5/20/2024
linux-headers tracy-client.0.5.1 Linux Unknown CVE-2024-35995 - ACPI: CPPC: Use access_width over bit_width for system memory accesses 5/20/2024
linux-headers tracy-client.0.3 Linux Unknown CVE-2024-35995 - ACPI: CPPC: Use access_width over bit_width for system memory accesses 5/20/2024
linux-headers tracy-client.0.5.2 Linux Unknown CVE-2024-35995 - ACPI: CPPC: Use access_width over bit_width for system memory accesses 5/20/2024