UbuntuUpdates.org

Bugs fixes in "whoopsie"

Origin Bug number Title Date fixed
Launchpad 1914481 use the size of the data when determining the server response 2021-02-18
Launchpad 1914481 use the size of the data when determining the server response 2021-02-18
Launchpad 1914481 use the size of the data when determining the server response 2021-02-17
Launchpad 1914481 use the size of the data when determining the server response 2021-02-17
Launchpad 1914481 use the size of the data when determining the server response 2021-02-09
Launchpad 1914481 use the size of the data when determining the server response 2021-02-09
Launchpad 1899100 whoopsie assert failure: double free or corruption (fasttop) 2020-12-14
Launchpad 1899100 whoopsie assert failure: double free or corruption (fasttop) 2020-12-14
Launchpad 1899100 whoopsie assert failure: double free or corruption (fasttop) 2020-12-07
Launchpad 1899100 whoopsie assert failure: double free or corruption (fasttop) 2020-12-07
Launchpad 1899100 whoopsie assert failure: double free or corruption (fasttop) 2020-12-07
Launchpad 1899100 whoopsie assert failure: double free or corruption (fasttop) 2020-11-27
CVE CVE-2020-15570 The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denia 2020-08-04
CVE CVE-2020-11937 RESERVED 2020-08-04
CVE CVE-2020-12135 bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() par 2020-08-04
Launchpad 1882180 DoS vulnerability: fail to allocate 2020-08-04
Launchpad 1881982 DoS vulnerability: cause resource exhaustion 2020-08-04
Launchpad 1872560 integer overflow in whoopsie 0.2.69 2020-08-04
CVE CVE-2020-15570 The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denia 2020-08-04
CVE CVE-2020-11937 RESERVED 2020-08-04



About   -   Send Feedback to @ubuntu_updates