« List of all packages

vhd-format-lwt

Opam page: https://opam.ocaml.org/packages/vhd-format-lwt/

Versions

Version
vhd-format-lwt.0.13.0 (latest)
vhd-format-lwt.0.12.3
vhd-format-lwt.0.12.2
vhd-format-lwt.0.12.1
vhd-format-lwt.0.12.0

Vulnerable external dependencies (57160)

Product For package Vendor Severity CVE Published
linux-headers vhd-format-lwt.0.13.0 Red Hat High CVE-2023-4004 - Kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() 7/31/2023
linux-headers vhd-format-lwt.0.12.1 Red Hat High CVE-2023-4004 - Kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() 7/31/2023
linux-headers vhd-format-lwt.0.12.0 Red Hat High CVE-2023-4004 - Kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() 7/31/2023
linux-headers vhd-format-lwt.0.12.2 Red Hat High CVE-2023-4004 - Kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() 7/31/2023
linux-headers vhd-format-lwt.0.12.3 Red Hat High CVE-2023-4004 - Kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() 7/31/2023
linux-headers vhd-format-lwt.0.13.0 Red Hat High CVE-2023-39198 - Kernel: qxl: race condition leading to use-after-free in qxl_mode_dumb_create() 11/9/2023
linux-headers vhd-format-lwt.0.12.3 Red Hat High CVE-2023-39198 - Kernel: qxl: race condition leading to use-after-free in qxl_mode_dumb_create() 11/9/2023
linux-headers vhd-format-lwt.0.12.2 Red Hat High CVE-2023-39198 - Kernel: qxl: race condition leading to use-after-free in qxl_mode_dumb_create() 11/9/2023
linux-headers vhd-format-lwt.0.12.1 Red Hat High CVE-2023-39198 - Kernel: qxl: race condition leading to use-after-free in qxl_mode_dumb_create() 11/9/2023
linux-headers vhd-format-lwt.0.12.0 Red Hat High CVE-2023-39198 - Kernel: qxl: race condition leading to use-after-free in qxl_mode_dumb_create() 11/9/2023
linux-headers vhd-format-lwt.0.12.2 Red Hat Medium CVE-2023-39197 - Kernel: dccp: conntrack out-of-bounds read in nf_conntrack_dccp_packet() 1/23/2024
linux-headers vhd-format-lwt.0.12.3 Red Hat Medium CVE-2023-39197 - Kernel: dccp: conntrack out-of-bounds read in nf_conntrack_dccp_packet() 1/23/2024
linux-headers vhd-format-lwt.0.13.0 Red Hat Medium CVE-2023-39197 - Kernel: dccp: conntrack out-of-bounds read in nf_conntrack_dccp_packet() 1/23/2024
linux-headers vhd-format-lwt.0.12.0 Red Hat Medium CVE-2023-39197 - Kernel: dccp: conntrack out-of-bounds read in nf_conntrack_dccp_packet() 1/23/2024
linux-headers vhd-format-lwt.0.12.1 Red Hat Medium CVE-2023-39197 - Kernel: dccp: conntrack out-of-bounds read in nf_conntrack_dccp_packet() 1/23/2024
linux-headers vhd-format-lwt.0.12.1 Red Hat Low CVE-2023-39194 - Kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() 10/9/2023
linux-headers vhd-format-lwt.0.12.0 Red Hat Low CVE-2023-39194 - Kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() 10/9/2023
linux-headers vhd-format-lwt.0.12.2 Red Hat Low CVE-2023-39194 - Kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() 10/9/2023
linux-headers vhd-format-lwt.0.13.0 Red Hat Low CVE-2023-39194 - Kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() 10/9/2023
linux-headers vhd-format-lwt.0.12.3 Red Hat Low CVE-2023-39194 - Kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() 10/9/2023