« List of all packages

tracy-client

Opam page: https://opam.ocaml.org/packages/tracy-client/

Versions

Version
tracy-client.0.6 (latest)
tracy-client.0.5.2
tracy-client.0.5.1
tracy-client.0.5
tracy-client.0.4
tracy-client.0.3
tracy-client.0.2
tracy-client.0.1

Vulnerable external dependencies (92168)

Product For package Vendor Severity CVE Published
linux-headers tracy-client.0.5.1 Linux Medium CVE-2022-49750 - cpufreq: CPPC: Add u64 casts to avoid overflowing 3/27/2025
linux-headers tracy-client.0.5 Linux Medium CVE-2022-49750 - cpufreq: CPPC: Add u64 casts to avoid overflowing 3/27/2025
linux-headers tracy-client.0.1 Linux Medium CVE-2022-49750 - cpufreq: CPPC: Add u64 casts to avoid overflowing 3/27/2025
linux-headers tracy-client.0.2 Linux Medium CVE-2022-49750 - cpufreq: CPPC: Add u64 casts to avoid overflowing 3/27/2025
linux-headers tracy-client.0.5.2 Linux Medium CVE-2022-49749 - i2c: designware: use casting of u64 in clock multiplication to avoid overflow 3/27/2025
linux-headers tracy-client.0.5 Linux Medium CVE-2022-49749 - i2c: designware: use casting of u64 in clock multiplication to avoid overflow 3/27/2025
linux-headers tracy-client.0.3 Linux Medium CVE-2022-49749 - i2c: designware: use casting of u64 in clock multiplication to avoid overflow 3/27/2025
linux-headers tracy-client.0.6 Linux Medium CVE-2022-49749 - i2c: designware: use casting of u64 in clock multiplication to avoid overflow 3/27/2025
linux-headers tracy-client.0.4 Linux Medium CVE-2022-49749 - i2c: designware: use casting of u64 in clock multiplication to avoid overflow 3/27/2025
linux-headers tracy-client.0.2 Linux Medium CVE-2022-49749 - i2c: designware: use casting of u64 in clock multiplication to avoid overflow 3/27/2025
linux-headers tracy-client.0.1 Linux Medium CVE-2022-49749 - i2c: designware: use casting of u64 in clock multiplication to avoid overflow 3/27/2025
linux-headers tracy-client.0.5.1 Linux Medium CVE-2022-49749 - i2c: designware: use casting of u64 in clock multiplication to avoid overflow 3/27/2025
linux-headers tracy-client.0.3 Linux Medium CVE-2022-49748 - perf/x86/amd: fix potential integer overflow on shift of a int 3/27/2025
linux-headers tracy-client.0.4 Linux Medium CVE-2022-49748 - perf/x86/amd: fix potential integer overflow on shift of a int 3/27/2025
linux-headers tracy-client.0.5.1 Linux Medium CVE-2022-49748 - perf/x86/amd: fix potential integer overflow on shift of a int 3/27/2025
linux-headers tracy-client.0.2 Linux Medium CVE-2022-49748 - perf/x86/amd: fix potential integer overflow on shift of a int 3/27/2025
linux-headers tracy-client.0.6 Linux Medium CVE-2022-49748 - perf/x86/amd: fix potential integer overflow on shift of a int 3/27/2025
linux-headers tracy-client.0.5.2 Linux Medium CVE-2022-49748 - perf/x86/amd: fix potential integer overflow on shift of a int 3/27/2025
linux-headers tracy-client.0.1 Linux Medium CVE-2022-49748 - perf/x86/amd: fix potential integer overflow on shift of a int 3/27/2025
linux-headers tracy-client.0.5 Linux Medium CVE-2022-49748 - perf/x86/amd: fix potential integer overflow on shift of a int 3/27/2025