« List of all packages

tracy-client

Opam page: https://opam.ocaml.org/packages/tracy-client/

Versions

Version
tracy-client.0.6 (latest)
tracy-client.0.5.2
tracy-client.0.5.1
tracy-client.0.5
tracy-client.0.4
tracy-client.0.3
tracy-client.0.2
tracy-client.0.1

Vulnerable external dependencies (93432)

Product For package Vendor Severity CVE Published
linux-headers tracy-client.0.2 Red Hat High CVE-2023-5972 - Kernel: the nfta_inner_num and nfta_expr_name netlink attributes accessed without checking its presence in nft_inner.c 11/23/2023
linux-headers tracy-client.0.5.2 Fedora High CVE-2023-5972 - Kernel: the nfta_inner_num and nfta_expr_name netlink attributes accessed without checking its presence in nft_inner.c 11/23/2023
linux-headers tracy-client.0.5 Red Hat High CVE-2023-5972 - Kernel: the nfta_inner_num and nfta_expr_name netlink attributes accessed without checking its presence in nft_inner.c 11/23/2023
linux-headers tracy-client.0.4 Fedora High CVE-2023-5972 - Kernel: the nfta_inner_num and nfta_expr_name netlink attributes accessed without checking its presence in nft_inner.c 11/23/2023
linux-headers tracy-client.0.5.1 n/a High CVE-2023-5972 - Kernel: the nfta_inner_num and nfta_expr_name netlink attributes accessed without checking its presence in nft_inner.c 11/23/2023
linux-headers tracy-client.0.4 n/a High CVE-2023-5972 - Kernel: the nfta_inner_num and nfta_expr_name netlink attributes accessed without checking its presence in nft_inner.c 11/23/2023
linux-headers tracy-client.0.6 n/a High CVE-2023-5972 - Kernel: the nfta_inner_num and nfta_expr_name netlink attributes accessed without checking its presence in nft_inner.c 11/23/2023
linux-headers tracy-client.0.5.2 n/a High CVE-2023-5972 - Kernel: the nfta_inner_num and nfta_expr_name netlink attributes accessed without checking its presence in nft_inner.c 11/23/2023
linux-headers tracy-client.0.6 Linux High CVE-2023-5717 - Out-of-bounds write in Linux kernel's Linux Kernel Performance Events (perf) component 10/25/2023
linux-headers tracy-client.0.5.1 Linux High CVE-2023-5717 - Out-of-bounds write in Linux kernel's Linux Kernel Performance Events (perf) component 10/25/2023
linux-headers tracy-client.0.2 Linux High CVE-2023-5717 - Out-of-bounds write in Linux kernel's Linux Kernel Performance Events (perf) component 10/25/2023
linux-headers tracy-client.0.5.2 Linux High CVE-2023-5717 - Out-of-bounds write in Linux kernel's Linux Kernel Performance Events (perf) component 10/25/2023
linux-headers tracy-client.0.3 Linux High CVE-2023-5717 - Out-of-bounds write in Linux kernel's Linux Kernel Performance Events (perf) component 10/25/2023
linux-headers tracy-client.0.5 Linux High CVE-2023-5717 - Out-of-bounds write in Linux kernel's Linux Kernel Performance Events (perf) component 10/25/2023
linux-headers tracy-client.0.4 Linux High CVE-2023-5717 - Out-of-bounds write in Linux kernel's Linux Kernel Performance Events (perf) component 10/25/2023
linux-headers tracy-client.0.1 Linux High CVE-2023-5717 - Out-of-bounds write in Linux kernel's Linux Kernel Performance Events (perf) component 10/25/2023
linux-headers tracy-client.0.2 Red Hat High CVE-2023-5633 - Kernel: vmwgfx: reference count issue leads to use-after-free in surface handling 10/23/2023
linux-headers tracy-client.0.1 Red Hat High CVE-2023-5633 - Kernel: vmwgfx: reference count issue leads to use-after-free in surface handling 10/23/2023
linux-headers tracy-client.0.6 Red Hat High CVE-2023-5633 - Kernel: vmwgfx: reference count issue leads to use-after-free in surface handling 10/23/2023
linux-headers tracy-client.0.3 Red Hat High CVE-2023-5633 - Kernel: vmwgfx: reference count issue leads to use-after-free in surface handling 10/23/2023