« List of all packages

tuntap

Opam page: https://opam.ocaml.org/packages/tuntap/

Versions

Version
tuntap.2.0.1 (latest)
tuntap.2.0.0
tuntap.1.8.1
tuntap.1.8.0
tuntap.1.7.0
tuntap.1.6.1
tuntap.1.6.0
tuntap.1.5.0
tuntap.1.4.1
tuntap.1.3.0

Vulnerable external dependencies (117400)

Product For package Vendor Severity CVE Published
linux-headers tuntap.1.8.0 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers tuntap.1.7.0 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers tuntap.1.3.0 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers tuntap.1.4.1 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers tuntap.1.6.0 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers tuntap.2.0.0 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers tuntap.1.5.0 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers tuntap.2.0.1 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers tuntap.1.8.1 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers tuntap.1.6.1 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers tuntap.1.7.0 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers tuntap.1.8.0 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers tuntap.1.8.1 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers tuntap.1.6.0 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers tuntap.2.0.1 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers tuntap.1.6.1 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers tuntap.1.5.0 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers tuntap.2.0.0 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers tuntap.1.3.0 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers tuntap.1.4.1 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023