« List of all packages

vhd-format

Opam page: https://opam.ocaml.org/packages/vhd-format/

Versions

Version
vhd-format.0.9.1 (latest)
vhd-format.0.13.0
vhd-format.0.12.3
vhd-format.0.12.2
vhd-format.0.12.1
vhd-format.0.12.0

Vulnerable external dependencies (70074)

Product For package Vendor Severity CVE Published
linux-headers vhd-format.0.12.1 Linux Unknown CVE-2024-36288 - SUNRPC: Fix loop termination condition in gss_free_in_token_pages() 6/21/2024
linux-headers vhd-format.0.12.0 Linux Unknown CVE-2024-36288 - SUNRPC: Fix loop termination condition in gss_free_in_token_pages() 6/21/2024
linux-headers vhd-format.0.12.0 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers vhd-format.0.12.1 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers vhd-format.0.13.0 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers vhd-format.0.9.1 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers vhd-format.0.12.2 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers vhd-format.0.12.3 Linux Unknown CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 6/21/2024
linux-headers vhd-format.0.12.0 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers vhd-format.0.12.1 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers vhd-format.0.9.1 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers vhd-format.0.13.0 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers vhd-format.0.12.2 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers vhd-format.0.12.3 Linux Unknown CVE-2024-36281 - net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules 6/21/2024
linux-headers vhd-format.0.12.0 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers vhd-format.0.12.2 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers vhd-format.0.12.1 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers vhd-format.0.12.3 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers vhd-format.0.9.1 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024
linux-headers vhd-format.0.13.0 Linux Unknown CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device 6/21/2024