Bugs fixes in "configobj"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2023-26112 | All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). | 2024-09-26 |
CVE | CVE-2023-26112 | All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). | 2024-09-26 |
CVE | CVE-2023-26112 | All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). | 2024-09-26 |
CVE | CVE-2023-26112 | All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). | 2024-09-26 |
Debian | 936325 | configobj: Python2 removal in sid/bullseye | 2020-04-14 |
Debian | 936325 | configobj: Python2 removal in sid/bullseye | 2020-04-13 |
About
-
Send Feedback to @ubuntu_updates