« List of all packages

vhd-format-lwt

Opam page: https://opam.ocaml.org/packages/vhd-format-lwt/

Versions

Version
vhd-format-lwt.0.13.0 (latest)
vhd-format-lwt.0.12.3
vhd-format-lwt.0.12.2
vhd-format-lwt.0.12.1
vhd-format-lwt.0.12.0

Vulnerable external dependencies (55940)

Product For package Vendor Severity CVE Published
linux-headers vhd-format-lwt.0.13.0 Linux Unknown CVE-2025-21768 - net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels 2/27/2025
linux-headers vhd-format-lwt.0.12.3 Linux Unknown CVE-2025-21768 - net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels 2/27/2025
linux-headers vhd-format-lwt.0.12.2 Linux Unknown CVE-2025-21768 - net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels 2/27/2025
linux-headers vhd-format-lwt.0.12.0 Linux Unknown CVE-2025-21768 - net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels 2/27/2025
linux-headers vhd-format-lwt.0.12.1 Linux Unknown CVE-2025-21768 - net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels 2/27/2025
linux-headers vhd-format-lwt.0.12.2 Linux Unknown CVE-2025-21767 - clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context 2/27/2025
linux-headers vhd-format-lwt.0.13.0 Linux Unknown CVE-2025-21767 - clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context 2/27/2025
linux-headers vhd-format-lwt.0.12.3 Linux Unknown CVE-2025-21767 - clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context 2/27/2025
linux-headers vhd-format-lwt.0.12.1 Linux Unknown CVE-2025-21767 - clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context 2/27/2025
linux-headers vhd-format-lwt.0.12.0 Linux Unknown CVE-2025-21767 - clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context 2/27/2025
linux-headers vhd-format-lwt.0.12.0 Linux Unknown CVE-2025-21766 - ipv4: use RCU protection in __ip_rt_update_pmtu() 2/27/2025
linux-headers vhd-format-lwt.0.13.0 Linux Unknown CVE-2025-21766 - ipv4: use RCU protection in __ip_rt_update_pmtu() 2/27/2025
linux-headers vhd-format-lwt.0.12.2 Linux Unknown CVE-2025-21766 - ipv4: use RCU protection in __ip_rt_update_pmtu() 2/27/2025
linux-headers vhd-format-lwt.0.12.3 Linux Unknown CVE-2025-21766 - ipv4: use RCU protection in __ip_rt_update_pmtu() 2/27/2025
linux-headers vhd-format-lwt.0.12.1 Linux Unknown CVE-2025-21766 - ipv4: use RCU protection in __ip_rt_update_pmtu() 2/27/2025
linux-headers vhd-format-lwt.0.12.0 Linux Unknown CVE-2025-21765 - ipv6: use RCU protection in ip6_default_advmss() 2/27/2025
linux-headers vhd-format-lwt.0.12.3 Linux Unknown CVE-2025-21765 - ipv6: use RCU protection in ip6_default_advmss() 2/27/2025
linux-headers vhd-format-lwt.0.13.0 Linux Unknown CVE-2025-21765 - ipv6: use RCU protection in ip6_default_advmss() 2/27/2025
linux-headers vhd-format-lwt.0.12.1 Linux Unknown CVE-2025-21765 - ipv6: use RCU protection in ip6_default_advmss() 2/27/2025
linux-headers vhd-format-lwt.0.12.2 Linux Unknown CVE-2025-21765 - ipv6: use RCU protection in ip6_default_advmss() 2/27/2025