« List of all packages

vhd-format-lwt

Opam page: https://opam.ocaml.org/packages/vhd-format-lwt/

Versions

Version
vhd-format-lwt.0.13.0 (latest)
vhd-format-lwt.0.12.3
vhd-format-lwt.0.12.2
vhd-format-lwt.0.12.1
vhd-format-lwt.0.12.0

Vulnerable external dependencies (62030)

Product For package Vendor Severity CVE Published
linux-headers vhd-format-lwt.0.12.1 Linux Unknown CVE-2023-53584 - ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process 10/4/2025
linux-headers vhd-format-lwt.0.12.0 Linux Unknown CVE-2023-53584 - ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process 10/4/2025
linux-headers vhd-format-lwt.0.13.0 Linux Unknown CVE-2023-53584 - ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process 10/4/2025
linux-headers vhd-format-lwt.0.12.2 Linux Unknown CVE-2023-53584 - ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process 10/4/2025
linux-headers vhd-format-lwt.0.12.3 Linux Unknown CVE-2023-53584 - ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process 10/4/2025
linux-headers vhd-format-lwt.0.12.1 Linux Unknown CVE-2023-53583 - perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start() 10/4/2025
linux-headers vhd-format-lwt.0.12.3 Linux Unknown CVE-2023-53583 - perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start() 10/4/2025
linux-headers vhd-format-lwt.0.12.0 Linux Unknown CVE-2023-53583 - perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start() 10/4/2025
linux-headers vhd-format-lwt.0.13.0 Linux Unknown CVE-2023-53583 - perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start() 10/4/2025
linux-headers vhd-format-lwt.0.12.2 Linux Unknown CVE-2023-53583 - perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start() 10/4/2025
linux-headers vhd-format-lwt.0.12.2 Linux Unknown CVE-2023-53582 - wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds 10/4/2025
linux-headers vhd-format-lwt.0.12.0 Linux Unknown CVE-2023-53582 - wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds 10/4/2025
linux-headers vhd-format-lwt.0.12.3 Linux Unknown CVE-2023-53582 - wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds 10/4/2025
linux-headers vhd-format-lwt.0.13.0 Linux Unknown CVE-2023-53582 - wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds 10/4/2025
linux-headers vhd-format-lwt.0.12.1 Linux Unknown CVE-2023-53582 - wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds 10/4/2025
linux-headers vhd-format-lwt.0.12.1 Linux Unknown CVE-2023-53581 - net/mlx5e: Check for NOT_READY flag state after locking 10/4/2025
linux-headers vhd-format-lwt.0.12.3 Linux Unknown CVE-2023-53581 - net/mlx5e: Check for NOT_READY flag state after locking 10/4/2025
linux-headers vhd-format-lwt.0.12.2 Linux Unknown CVE-2023-53581 - net/mlx5e: Check for NOT_READY flag state after locking 10/4/2025
linux-headers vhd-format-lwt.0.13.0 Linux Unknown CVE-2023-53581 - net/mlx5e: Check for NOT_READY flag state after locking 10/4/2025
linux-headers vhd-format-lwt.0.12.0 Linux Unknown CVE-2023-53581 - net/mlx5e: Check for NOT_READY flag state after locking 10/4/2025