« List of all packages

vhd-format-lwt

Opam page: https://opam.ocaml.org/packages/vhd-format-lwt/

Versions

Version
vhd-format-lwt.0.13.0 (latest)
vhd-format-lwt.0.12.3
vhd-format-lwt.0.12.2
vhd-format-lwt.0.12.1
vhd-format-lwt.0.12.0

Vulnerable external dependencies (63175)

Product For package Vendor Severity CVE Published
linux-headers vhd-format-lwt.0.13.0 Linux High CVE-2026-23230 - smb: client: split cached_fid bitfields to avoid shared-byte RMW races 2/18/2026
linux-headers vhd-format-lwt.0.12.3 Linux High CVE-2026-23230 - smb: client: split cached_fid bitfields to avoid shared-byte RMW races 2/18/2026
linux-headers vhd-format-lwt.0.12.2 Linux High CVE-2026-23230 - smb: client: split cached_fid bitfields to avoid shared-byte RMW races 2/18/2026
linux-headers vhd-format-lwt.0.12.0 Linux High CVE-2026-23230 - smb: client: split cached_fid bitfields to avoid shared-byte RMW races 2/18/2026
linux-headers vhd-format-lwt.0.12.1 Linux High CVE-2026-23230 - smb: client: split cached_fid bitfields to avoid shared-byte RMW races 2/18/2026
linux-headers vhd-format-lwt.0.12.1 Linux Unknown CVE-2026-23229 - crypto: virtio - Add spinlock protection with virtqueue notification 2/18/2026
linux-headers vhd-format-lwt.0.13.0 Linux Unknown CVE-2026-23229 - crypto: virtio - Add spinlock protection with virtqueue notification 2/18/2026
linux-headers vhd-format-lwt.0.12.2 Linux Unknown CVE-2026-23229 - crypto: virtio - Add spinlock protection with virtqueue notification 2/18/2026
linux-headers vhd-format-lwt.0.12.0 Linux Unknown CVE-2026-23229 - crypto: virtio - Add spinlock protection with virtqueue notification 2/18/2026
linux-headers vhd-format-lwt.0.12.3 Linux Unknown CVE-2026-23229 - crypto: virtio - Add spinlock protection with virtqueue notification 2/18/2026
linux-headers vhd-format-lwt.0.12.2 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
linux-headers vhd-format-lwt.0.12.1 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
linux-headers vhd-format-lwt.0.12.3 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
linux-headers vhd-format-lwt.0.13.0 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
linux-headers vhd-format-lwt.0.12.0 Linux Unknown CVE-2026-23228 - smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() 2/18/2026
linux-headers vhd-format-lwt.0.12.2 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers vhd-format-lwt.0.12.0 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers vhd-format-lwt.0.13.0 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers vhd-format-lwt.0.12.3 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026
linux-headers vhd-format-lwt.0.12.1 Linux High CVE-2026-23227 - drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free 2/18/2026