« List of all packages

tracy-client

Opam page: https://opam.ocaml.org/packages/tracy-client/

Versions

Version
tracy-client.0.6 (latest)
tracy-client.0.5.2
tracy-client.0.5.1
tracy-client.0.5
tracy-client.0.4
tracy-client.0.3
tracy-client.0.2
tracy-client.0.1

Vulnerable external dependencies (93432)

Product For package Vendor Severity CVE Published
linux-headers tracy-client.0.5 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers tracy-client.0.5.2 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers tracy-client.0.6 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers tracy-client.0.4 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers tracy-client.0.4 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers tracy-client.0.5.2 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers tracy-client.0.1 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers tracy-client.0.5.1 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers tracy-client.0.2 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers tracy-client.0.5 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers tracy-client.0.3 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers tracy-client.0.6 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers tracy-client.0.6 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers tracy-client.0.2 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers tracy-client.0.3 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers tracy-client.0.5.2 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers tracy-client.0.1 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers tracy-client.0.5.1 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers tracy-client.0.5 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023
linux-headers tracy-client.0.4 Red Hat High CVE-2023-4147 - Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free 8/7/2023