« List of all packages

tracy-client

Opam page: https://opam.ocaml.org/packages/tracy-client/

Versions

Version
tracy-client.0.6 (latest)
tracy-client.0.5.2
tracy-client.0.5.1
tracy-client.0.5
tracy-client.0.4
tracy-client.0.3
tracy-client.0.2
tracy-client.0.1

Vulnerable external dependencies (93432)

Product For package Vendor Severity CVE Published
linux-headers tracy-client.0.3 Linux Unknown CVE-2024-26674 - x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups 4/2/2024
linux-headers tracy-client.0.2 Linux Unknown CVE-2024-26674 - x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups 4/2/2024
linux-headers tracy-client.0.5.2 Linux Unknown CVE-2024-26674 - x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups 4/2/2024
linux-headers tracy-client.0.6 Linux Unknown CVE-2024-26674 - x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups 4/2/2024
linux-headers tracy-client.0.4 Linux Unknown CVE-2024-26673 - netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations 4/2/2024
linux-headers tracy-client.0.5.1 Linux Unknown CVE-2024-26673 - netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations 4/2/2024
linux-headers tracy-client.0.5 Linux Unknown CVE-2024-26673 - netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations 4/2/2024
linux-headers tracy-client.0.2 Linux Unknown CVE-2024-26673 - netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations 4/2/2024
linux-headers tracy-client.0.3 Linux Unknown CVE-2024-26673 - netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations 4/2/2024
linux-headers tracy-client.0.1 Linux Unknown CVE-2024-26673 - netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations 4/2/2024
linux-headers tracy-client.0.5.2 Linux Unknown CVE-2024-26673 - netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations 4/2/2024
linux-headers tracy-client.0.6 Linux Unknown CVE-2024-26673 - netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations 4/2/2024
linux-headers tracy-client.0.4 Linux High CVE-2024-26672 - drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' 4/2/2024
linux-headers tracy-client.0.5.1 Linux High CVE-2024-26672 - drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' 4/2/2024
linux-headers tracy-client.0.3 Linux High CVE-2024-26672 - drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' 4/2/2024
linux-headers tracy-client.0.5 Linux High CVE-2024-26672 - drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' 4/2/2024
linux-headers tracy-client.0.5.2 Linux High CVE-2024-26672 - drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' 4/2/2024
linux-headers tracy-client.0.6 Linux High CVE-2024-26672 - drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' 4/2/2024
linux-headers tracy-client.0.2 Linux High CVE-2024-26672 - drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' 4/2/2024
linux-headers tracy-client.0.1 Linux High CVE-2024-26672 - drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' 4/2/2024