Bugs fixes in "libproxy"
| Origin | Bug number | Title | Date fixed |
|---|---|---|---|
| CVE | CVE-2020-26154 | url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a | 2021-01-04 |
| CVE | CVE-2020-26154 | url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a | 2021-01-04 |
| CVE | CVE-2020-26154 | url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a | 2021-01-04 |
| CVE | CVE-2020-26154 | url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a | 2021-01-04 |
| CVE | CVE-2020-26154 | url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a | 2021-01-04 |
| CVE | CVE-2020-26154 | url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a | 2021-01-04 |
| CVE | CVE-2020-26154 | url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a | 2021-01-04 |
| CVE | CVE-2020-26154 | url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a | 2021-01-04 |
| CVE | CVE-2020-25219 | url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an | 2020-09-17 |
| CVE | CVE-2020-25219 | url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an | 2020-09-17 |
| CVE | CVE-2020-25219 | url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an | 2020-09-17 |
| CVE | CVE-2020-25219 | url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an | 2020-09-17 |
| CVE | CVE-2020-25219 | url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an | 2020-09-17 |
| CVE | CVE-2020-25219 | url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an | 2020-09-17 |
| CVE | CVE-2020-25219 | url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an | 2020-09-17 |
| CVE | CVE-2020-25219 | url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an | 2020-09-17 |
| Launchpad | 1875558 | [SRU] libproxy1-plugin-gsettings triggers a lot of warnings | 2020-06-09 |
| Launchpad | 1875558 | [SRU] libproxy1-plugin-gsettings triggers a lot of warnings | 2020-06-09 |
| Launchpad | 1875558 | [SRU] libproxy1-plugin-gsettings triggers a lot of warnings | 2020-05-23 |
| Launchpad | 1875558 | [SRU] libproxy1-plugin-gsettings triggers a lot of warnings | 2020-05-23 |
About
-
Send Feedback to @ubuntu_updates