« List of all packages

mm

Opam page: https://opam.ocaml.org/packages/mm/

Versions

Version
mm.0.8.6 (latest)
mm.0.8.5
mm.0.8.4
mm.0.8.3
mm.0.8.2
mm.0.8.1
mm.0.8.0
mm.0.7.4
mm.0.7.2
mm.0.7.1
mm.0.7.0
mm.0.6.0
mm.0.5.1
mm.0.5.0
mm.0.4.1
mm.0.4.0
mm.0.3.1

Vulnerable external dependencies (131351)

Product For package Vendor Severity CVE Published
linux-headers mm.0.7.4 Linux High CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component 9/6/2023
linux-headers mm.0.8.2 Linux High CVE-2023-4207 - Use-after-free in Linux kernel's net/sched: cls_fw component 9/6/2023
linux-headers mm.0.8.2 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers mm.0.8.3 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers mm.0.8.6 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers mm.0.7.4 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers mm.0.8.4 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers mm.0.8.1 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers mm.0.7.2 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers mm.0.7.1 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers mm.0.7.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers mm.0.8.5 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers mm.0.8.0 Linux High CVE-2023-4206 - Use-after-free in Linux kernel's net/sched: cls_route component 9/6/2023
linux-headers mm.0.8.3 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers mm.0.8.4 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers mm.0.7.4 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers mm.0.8.2 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers mm.0.8.6 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers mm.0.7.2 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023
linux-headers mm.0.7.0 Red Hat Medium CVE-2023-4194 - Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 8/7/2023