Home
Packages
Report
Policy
Login
Signup
« List of all packages
mm
Subscribe
Opam page:
https://opam.ocaml.org/packages/mm/
Versions
Version
mm.0.8.6
(latest)
Subscribe
mm.0.8.5
Subscribe
mm.0.8.4
Subscribe
mm.0.8.3
Subscribe
mm.0.8.2
Subscribe
mm.0.8.1
Subscribe
mm.0.8.0
Subscribe
mm.0.7.4
Subscribe
mm.0.7.2
Subscribe
mm.0.7.1
Subscribe
mm.0.7.0
Subscribe
mm.0.6.0
Subscribe
mm.0.5.1
Subscribe
mm.0.5.0
Subscribe
mm.0.4.1
Subscribe
mm.0.4.0
Subscribe
mm.0.3.1
Subscribe
Vulnerable external dependencies (20)
Product
For package
Vendor
Severity
CVE
Published
linux-headers
mm.0.8.3
Linux
High
CVE-2025-21879 - btrfs: fix use-after-free on inode when scanning root during em shrinking
3/27/2025
linux-headers
mm.0.7.4
Linux
High
CVE-2025-21879 - btrfs: fix use-after-free on inode when scanning root during em shrinking
3/27/2025
linux-headers
mm.0.8.4
Linux
High
CVE-2025-21879 - btrfs: fix use-after-free on inode when scanning root during em shrinking
3/27/2025
linux-headers
mm.0.8.6
Linux
High
CVE-2025-21879 - btrfs: fix use-after-free on inode when scanning root during em shrinking
3/27/2025
linux-headers
mm.0.8.5
Linux
High
CVE-2025-21867 - bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
3/27/2025
linux-headers
mm.0.8.4
Linux
High
CVE-2025-21867 - bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
3/27/2025
linux-headers
mm.0.7.1
Linux
High
CVE-2025-21867 - bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
3/27/2025
linux-headers
mm.0.8.6
Linux
High
CVE-2025-21867 - bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
3/27/2025
linux-headers
mm.0.7.2
Linux
High
CVE-2025-21867 - bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
3/27/2025
linux-headers
mm.0.8.0
Linux
High
CVE-2025-21867 - bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
3/27/2025
linux-headers
mm.0.7.0
Linux
High
CVE-2025-21867 - bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
3/27/2025
linux-headers
mm.0.8.2
Linux
High
CVE-2025-21867 - bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
3/27/2025
linux-headers
mm.0.7.4
Linux
High
CVE-2025-21867 - bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
3/27/2025
linux-headers
mm.0.8.3
Linux
High
CVE-2025-21867 - bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
3/27/2025
linux-headers
mm.0.8.1
Linux
High
CVE-2025-21867 - bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
3/27/2025
linux-headers
mm.0.8.5
Linux
Unknown
CVE-2025-21866 - powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC
3/12/2025
linux-headers
mm.0.8.4
Linux
Unknown
CVE-2025-21866 - powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC
3/12/2025
linux-headers
mm.0.8.1
Linux
Unknown
CVE-2025-21866 - powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC
3/12/2025
linux-headers
mm.0.8.0
Linux
Unknown
CVE-2025-21866 - powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC
3/12/2025
linux-headers
mm.0.8.3
Linux
Unknown
CVE-2025-21866 - powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC
3/12/2025
Previous
1...
64
65
66
67
68
69
70
71
72
73
74
...4257
Next