« List of all packages

conf-bpftool

Opam page: https://opam.ocaml.org/packages/conf-bpftool/

Versions

Version
conf-bpftool.0.1.0 (latest)

Vulnerable external dependencies (22599)

Product For package Vendor Severity CVE Published
bpftool conf-bpftool.0.1.0 Red Hat High CVE-2023-42753 - Kernel: netfilter: potential slab-out-of-bound access due to integer underflow 9/25/2023
linux-tools-common conf-bpftool.0.1.0 Fedora Medium CVE-2023-42752 - Kernel: integer overflow in igmpv3_newpack leading to exploitable memory access 10/13/2023
bpftool conf-bpftool.0.1.0 Red Hat Medium CVE-2023-42752 - Kernel: integer overflow in igmpv3_newpack leading to exploitable memory access 10/13/2023
linux-tools-common conf-bpftool.0.1.0 n/a Medium CVE-2023-42752 - Kernel: integer overflow in igmpv3_newpack leading to exploitable memory access 10/13/2023
bpftool conf-bpftool.0.1.0 Fedora Medium CVE-2023-42752 - Kernel: integer overflow in igmpv3_newpack leading to exploitable memory access 10/13/2023
bpftool conf-bpftool.0.1.0 n/a Medium CVE-2023-42752 - Kernel: integer overflow in igmpv3_newpack leading to exploitable memory access 10/13/2023
linux-tools-common conf-bpftool.0.1.0 Red Hat Medium CVE-2023-42752 - Kernel: integer overflow in igmpv3_newpack leading to exploitable memory access 10/13/2023
bpftool conf-bpftool.0.1.0 Red Hat Medium CVE-2023-4273 - Kernel: exfat: stack overflow in exfat_get_uniname_from_ext_entry 8/9/2023
linux-tools-common conf-bpftool.0.1.0 Red Hat Medium CVE-2023-4273 - Kernel: exfat: stack overflow in exfat_get_uniname_from_ext_entry 8/9/2023
bpftool conf-bpftool.0.1.0 Linux High CVE-2023-4244 - Use-after-free in Linux kernel's netfilter: nf_tables component 9/6/2023
linux-tools-common conf-bpftool.0.1.0 Linux High CVE-2023-4244 - Use-after-free in Linux kernel's netfilter: nf_tables component 9/6/2023
linux-tools-common conf-bpftool.0.1.0 Linux High CVE-2023-4208 - Use-after-free in Linux kernel's net/sched: cls_u32 component 9/6/2023
bpftool conf-bpftool.0.1.0 Linux High CVE-2023-4208 - Use-after-free in Linux kernel's net/sched: cls_u32 component 9/6/2023
linux-tools-common conf-bpftool.0.1.0 Linux High CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component 9/6/2023
bpftool conf-bpftool.0.1.0 Linux High CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component 9/6/2023
bpftool conf-bpftool.0.1.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-tools-common conf-bpftool.0.1.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-tools-common conf-bpftool.0.1.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
bpftool conf-bpftool.0.1.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-tools-common conf-bpftool.0.1.0 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023