« List of all packages

tracy-client

Opam page: https://opam.ocaml.org/packages/tracy-client/

Versions

Version
tracy-client.0.6 (latest)
tracy-client.0.5.2
tracy-client.0.5.1
tracy-client.0.5
tracy-client.0.4
tracy-client.0.3
tracy-client.0.2
tracy-client.0.1

Vulnerable external dependencies (85752)

Product For package Vendor Severity CVE Published
linux-headers tracy-client.0.4 Linux High CVE-2025-40014 - objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() 4/18/2025
linux-headers tracy-client.0.5.2 Linux High CVE-2025-40014 - objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() 4/18/2025
linux-headers tracy-client.0.2 Linux High CVE-2025-40014 - objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() 4/18/2025
linux-headers tracy-client.0.6 Linux High CVE-2025-40014 - objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() 4/18/2025
linux-headers tracy-client.0.1 Linux High CVE-2025-40014 - objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() 4/18/2025
linux-headers tracy-client.0.5 Linux High CVE-2025-40014 - objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() 4/18/2025
linux-headers tracy-client.0.3 Linux High CVE-2025-40014 - objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() 4/18/2025
linux-headers tracy-client.0.5.1 Linux High CVE-2025-40014 - objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() 4/18/2025
linux-headers tracy-client.0.6 Linux Unknown CVE-2025-39989 - x86/mce: use is_copy_from_user() to determine copy-from-user context 4/18/2025
linux-headers tracy-client.0.5.1 Linux Unknown CVE-2025-39989 - x86/mce: use is_copy_from_user() to determine copy-from-user context 4/18/2025
linux-headers tracy-client.0.4 Linux Unknown CVE-2025-39989 - x86/mce: use is_copy_from_user() to determine copy-from-user context 4/18/2025
linux-headers tracy-client.0.3 Linux Unknown CVE-2025-39989 - x86/mce: use is_copy_from_user() to determine copy-from-user context 4/18/2025
linux-headers tracy-client.0.1 Linux Unknown CVE-2025-39989 - x86/mce: use is_copy_from_user() to determine copy-from-user context 4/18/2025
linux-headers tracy-client.0.5.2 Linux Unknown CVE-2025-39989 - x86/mce: use is_copy_from_user() to determine copy-from-user context 4/18/2025
linux-headers tracy-client.0.2 Linux Unknown CVE-2025-39989 - x86/mce: use is_copy_from_user() to determine copy-from-user context 4/18/2025
linux-headers tracy-client.0.5 Linux Unknown CVE-2025-39989 - x86/mce: use is_copy_from_user() to determine copy-from-user context 4/18/2025
linux-headers tracy-client.0.1 Linux Unknown CVE-2025-39930 - ASoC: simple-card-utils: Don't use __free(device_node) at graph_util_parse_dai() 4/18/2025
linux-headers tracy-client.0.3 Linux Unknown CVE-2025-39930 - ASoC: simple-card-utils: Don't use __free(device_node) at graph_util_parse_dai() 4/18/2025
linux-headers tracy-client.0.6 Linux Unknown CVE-2025-39930 - ASoC: simple-card-utils: Don't use __free(device_node) at graph_util_parse_dai() 4/18/2025
linux-headers tracy-client.0.5 Linux Unknown CVE-2025-39930 - ASoC: simple-card-utils: Don't use __free(device_node) at graph_util_parse_dai() 4/18/2025