« List of all packages

vhd-format

Opam page: https://opam.ocaml.org/packages/vhd-format/

Versions

Version
vhd-format.0.9.1 (latest)
vhd-format.0.13.0
vhd-format.0.12.3
vhd-format.0.12.2
vhd-format.0.12.1
vhd-format.0.12.0

Vulnerable external dependencies (69126)

Product For package Vendor Severity CVE Published
linux-headers vhd-format.0.13.0 Linux Medium CVE-2023-52872 - tty: n_gsm: fix race condition in status line change on dead connections 5/21/2024
linux-headers vhd-format.0.9.1 Linux Medium CVE-2023-52872 - tty: n_gsm: fix race condition in status line change on dead connections 5/21/2024
linux-headers vhd-format.0.12.3 Linux Medium CVE-2023-52872 - tty: n_gsm: fix race condition in status line change on dead connections 5/21/2024
linux-headers vhd-format.0.12.1 Linux Medium CVE-2023-52872 - tty: n_gsm: fix race condition in status line change on dead connections 5/21/2024
linux-headers vhd-format.0.12.0 Linux Medium CVE-2023-52872 - tty: n_gsm: fix race condition in status line change on dead connections 5/21/2024
linux-headers vhd-format.0.12.2 Linux Medium CVE-2023-52872 - tty: n_gsm: fix race condition in status line change on dead connections 5/21/2024
linux-headers vhd-format.0.12.0 Linux Unknown CVE-2023-52871 - soc: qcom: llcc: Handle a second device without data corruption 5/21/2024
linux-headers vhd-format.0.12.2 Linux Unknown CVE-2023-52871 - soc: qcom: llcc: Handle a second device without data corruption 5/21/2024
linux-headers vhd-format.0.12.1 Linux Unknown CVE-2023-52871 - soc: qcom: llcc: Handle a second device without data corruption 5/21/2024
linux-headers vhd-format.0.13.0 Linux Unknown CVE-2023-52871 - soc: qcom: llcc: Handle a second device without data corruption 5/21/2024
linux-headers vhd-format.0.9.1 Linux Unknown CVE-2023-52871 - soc: qcom: llcc: Handle a second device without data corruption 5/21/2024
linux-headers vhd-format.0.12.3 Linux Unknown CVE-2023-52871 - soc: qcom: llcc: Handle a second device without data corruption 5/21/2024
linux-headers vhd-format.0.9.1 Linux Medium CVE-2023-52870 - clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data 5/21/2024
linux-headers vhd-format.0.12.3 Linux Medium CVE-2023-52870 - clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data 5/21/2024
linux-headers vhd-format.0.12.0 Linux Medium CVE-2023-52870 - clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data 5/21/2024
linux-headers vhd-format.0.13.0 Linux Medium CVE-2023-52870 - clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data 5/21/2024
linux-headers vhd-format.0.12.1 Linux Medium CVE-2023-52870 - clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data 5/21/2024
linux-headers vhd-format.0.12.2 Linux Medium CVE-2023-52870 - clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data 5/21/2024
linux-headers vhd-format.0.12.0 Linux Medium CVE-2023-52869 - pstore/platform: Add check for kstrdup 5/21/2024
linux-headers vhd-format.0.12.1 Linux Medium CVE-2023-52869 - pstore/platform: Add check for kstrdup 5/21/2024