« List of all packages

tracy-client

Opam page: https://opam.ocaml.org/packages/tracy-client/

Versions

Version
tracy-client.0.6 (latest)
tracy-client.0.5.2
tracy-client.0.5.1
tracy-client.0.5
tracy-client.0.4
tracy-client.0.3
tracy-client.0.2
tracy-client.0.1

Vulnerable external dependencies (93432)

Product For package Vendor Severity CVE Published
linux-headers tracy-client.0.3 Red Hat Medium CVE-2024-0841 - Kernel: hugetlbfs: null pointer dereference in hugetlbfs_fill_super function 1/28/2024
linux-headers tracy-client.0.5.2 Red Hat Medium CVE-2024-0841 - Kernel: hugetlbfs: null pointer dereference in hugetlbfs_fill_super function 1/28/2024
linux-headers tracy-client.0.2 Red Hat Medium CVE-2024-0841 - Kernel: hugetlbfs: null pointer dereference in hugetlbfs_fill_super function 1/28/2024
linux-headers tracy-client.0.1 Red Hat Medium CVE-2024-0841 - Kernel: hugetlbfs: null pointer dereference in hugetlbfs_fill_super function 1/28/2024
linux-headers tracy-client.0.2 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.1 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.1 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.5 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.2 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.4 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.6 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.4 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.6 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.5 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.5.2 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.3 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.5.1 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.5.1 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.3 Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024
linux-headers tracy-client.0.5.2 Red Hat Medium CVE-2024-0775 - Kernel: use-after-free while changing the mount option in __ext4_remount leading 1/22/2024