« List of all packages

mm

Opam page: https://opam.ocaml.org/packages/mm/

Versions

Version
mm.0.8.6 (latest)
mm.0.8.5
mm.0.8.4
mm.0.8.3
mm.0.8.2
mm.0.8.1
mm.0.8.0
mm.0.7.4
mm.0.7.2
mm.0.7.1
mm.0.7.0
mm.0.6.0
mm.0.5.1
mm.0.5.0
mm.0.4.1
mm.0.4.0
mm.0.3.1

Vulnerable external dependencies (131351)

Product For package Vendor Severity CVE Published
linux-headers mm.0.8.1 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers mm.0.8.4 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers mm.0.8.0 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers mm.0.7.2 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers mm.0.8.3 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers mm.0.7.0 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers mm.0.7.1 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers mm.0.8.5 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers mm.0.8.6 Red Hat Medium CVE-2023-39192 - Kernel: netfilter: xtables out-of-bounds read in u32_match_it() 10/9/2023
linux-headers mm.0.8.4 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers mm.0.8.1 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers mm.0.8.5 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers mm.0.8.2 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers mm.0.8.6 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers mm.0.7.1 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers mm.0.8.0 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers mm.0.7.2 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers mm.0.7.4 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers mm.0.7.0 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023
linux-headers mm.0.8.3 Red Hat High CVE-2023-39191 - Kernel: ebpf: insufficient stack type checks in dynptr 10/4/2023