Known vulnerabilities in Canonical Ltd. corosync (Ubuntu package) 1.3.0-3 - page 2

Vendor: Canonical Ltd.
Website: https://www.ubuntu.com/
Total Security Bulletins: 36

Security bulletins (36)

Secuity bulletin Severity Status Published
SB2020121111: Integer overflow in squid (Alpine package) High
Patched
11.12.2020
SB2020102216: Resource exhaustion in squid (Alpine package) Low
Patched
22.10.2020
SB2020102215: HTTP response splitting in squid (Alpine package) Medium
Patched
22.10.2020
SB2020102214: Inconsistent interpretation of HTTP requests in squid (Alpine package) Medium
Patched
22.10.2020
SB2020022442: Out-of-bounds read in squid (Alpine package) Medium
Patched
24.02.2020
SB2020022443: Input validation error in squid (Alpine package) Medium
Patched
24.02.2020
SB2020022444: Buffer overflow in squid (Alpine package) High
Patched
24.02.2020
SB2020022445: Buffer overflow in squid (Alpine package) Medium
Patched
24.02.2020
SB2019111122: Information disclosure in squid (Alpine package) Low
Patched
11.11.2019
SB2018022817: NULL pointer derefenrece in squid (Alpine package) Medium
Patched
28.02.2018
SB2016072905: Input validation error in squid (Alpine package) Medium
Patched
29.07.2016
SB2016072906: Input validation error in squid (Alpine package) Medium
Patched
29.07.2016
SB2016050937: Stack-based buffer overflow in squid (Alpine package) High
Patched
09.05.2016
SB2016050938: Buffer overflow in squid (Alpine package) Low
Patched
09.05.2016
SB2016050939: Buffer overflow in squid (Alpine package) High
Patched
09.05.2016
SB2015120206: Permissions, Privileges, and Access Controls in squid (Alpine package) Medium
Patched
02.12.2015


Showing elements 21 - 40 out of 36